Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 00:09
Behavioral task
behavioral1
Sample
Vmenu3.0.exe
Resource
win7-20250207-en
5 signatures
150 seconds
General
-
Target
Vmenu3.0.exe
-
Size
342KB
-
MD5
0ec2dd747aeeea47c1ded810d53944eb
-
SHA1
4dcc433eced401ae8ba0e96c6fd70296ae346093
-
SHA256
4fb3dd32a2120a0647add978ff93345f3116be9cb17c3640420ab0d8abd798bc
-
SHA512
c467826697415c97d5e57e3ae6b16746393eb02a859989c86386495b73b7f463c71e49043fc1d22bda36dca75319b3847345aca8141650655002b03a934fdb3c
-
SSDEEP
6144:rwWb4Jm7gw+GIIIIIIIhIIIIIIIIIIIIIIIU:Im7gT
Malware Config
Extracted
Family
xworm
C2
operates-vampire.with.playit.plus:4353
Attributes
-
Install_directory
%LocalAppData%
-
install_file
XClient2.0.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1700-1-0x0000000000920000-0x000000000097C000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1700 Vmenu3.0.exe