Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 23:30
Behavioral task
behavioral1
Sample
dddddddddddddddddddddddddddddddddddddddddddddd.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
dddddddddddddddddddddddddddddddddddddddddddddd.exe
-
Size
66KB
-
MD5
8baabd2d13aad2042c53812049e3d513
-
SHA1
dbe003cfb4e6d4d1ff321e41a8b9af8070ef0dbc
-
SHA256
658eee587548b0fd38329eb2846cb9329bcd086d8c15f3f21205c5611348e748
-
SHA512
d4c02d912474dfe01d7302ee41ce5756d18ad2f0a80940f5c4b24c0f0e2f531dd27261f8e674389f1425c1adec6432ec049cdde43fdd30a1a413d91f9528ba72
-
SSDEEP
1536:hMVcl7LToT6KohtQjUEhf1yG9ObBBTuBNnOBakjebIO1ouuhjdgo:eVQcT6KooHwbLWn8CbIO1ouupqo
Malware Config
Extracted
Family
xworm
C2
homes-customized.gl.at.ply.gg:49855
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1992-1-0x0000000000C90000-0x0000000000CA6000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 dddddddddddddddddddddddddddddddddddddddddddddd.exe