Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 23:30

General

  • Target

    dddddddddddddddddddddddddddddddddddddddddddddd.exe

  • Size

    66KB

  • MD5

    8baabd2d13aad2042c53812049e3d513

  • SHA1

    dbe003cfb4e6d4d1ff321e41a8b9af8070ef0dbc

  • SHA256

    658eee587548b0fd38329eb2846cb9329bcd086d8c15f3f21205c5611348e748

  • SHA512

    d4c02d912474dfe01d7302ee41ce5756d18ad2f0a80940f5c4b24c0f0e2f531dd27261f8e674389f1425c1adec6432ec049cdde43fdd30a1a413d91f9528ba72

  • SSDEEP

    1536:hMVcl7LToT6KohtQjUEhf1yG9ObBBTuBNnOBakjebIO1ouuhjdgo:eVQcT6KooHwbLWn8CbIO1ouupqo

Score
10/10

Malware Config

Extracted

Family

xworm

C2

homes-customized.gl.at.ply.gg:49855

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dddddddddddddddddddddddddddddddddddddddddddddd.exe
    "C:\Users\Admin\AppData\Local\Temp\dddddddddddddddddddddddddddddddddddddddddddddd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-0-0x00007FF95B163000-0x00007FF95B165000-memory.dmp

    Filesize

    8KB

  • memory/1992-1-0x0000000000C90000-0x0000000000CA6000-memory.dmp

    Filesize

    88KB

  • memory/1992-2-0x00007FF95B160000-0x00007FF95BC21000-memory.dmp

    Filesize

    10.8MB

  • memory/1992-3-0x00007FF95B160000-0x00007FF95BC21000-memory.dmp

    Filesize

    10.8MB