Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 23:20
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
svchost.exe
-
Size
71KB
-
MD5
52256c0ff9f5af34e20119a2a33eff6c
-
SHA1
b221e327c41d48db10e95fac86d82e2eb71e7a56
-
SHA256
d9c1ee6233aaac1d0bb572c813e3ce0872dd0994b6bcde393d6ae3a6f6fdf5d2
-
SHA512
fdc4d1bf8e23c9bf71e30f1b34d917b800a54c8c08a440ab7d5a9ff7529a978474959eaa73325f0d14f0ba1b30a66c786c529b6ba83b2ece2d1a821cb10c284c
-
SSDEEP
1536:f10hA2k7XUSsR4nYciktv8bY+I0zDQmfRO3C3dccijRr:90KlXiq8bYPWDQMO3IeNr
Malware Config
Extracted
Family
xworm
C2
172.245.191.79:3030
Attributes
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2516-0-0x00000000008D0000-0x00000000008E8000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 svchost.exe