Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/03/2025, 19:33
Static task
static1
General
-
Target
VuxaSpoofer.exe
-
Size
3.6MB
-
MD5
d4473f64014380bd2f087935d01e4cf4
-
SHA1
39d009e253008ed76a65c76bcd55010b016638c1
-
SHA256
7ad235452a11f0343fcf1def524d04800e591b13e40188cc1cf5be37e9628f36
-
SHA512
27865bf8b587ee2b5da590ff72a510702591e52c2d8e377cf90b44e2a602ae5a6f605231506cbd65b41fa7c28df332e08aeca3fbb6ee0aea9c33540179e3ed34
-
SSDEEP
98304:GLYNYcvh7hfw9An9todOS5J+ZkvtnpKLiFqI8wM/4v:GLw1hFfwMrQOS5fVnpKGFm/K
Malware Config
Extracted
xworm
front-cad.gl.at.ply.gg:36514
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001c00000002aef2-19.dat family_xworm behavioral1/memory/1920-22-0x0000000000F70000-0x0000000000F8C000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 4780 Paid.exe 1920 Connect.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 Connect.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4780 2916 VuxaSpoofer.exe 81 PID 2916 wrote to memory of 4780 2916 VuxaSpoofer.exe 81 PID 2916 wrote to memory of 1920 2916 VuxaSpoofer.exe 82 PID 2916 wrote to memory of 1920 2916 VuxaSpoofer.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\VuxaSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\VuxaSpoofer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\Paid.exe"C:\Users\Admin\AppData\Roaming\Paid.exe"2⤵
- Executes dropped EXE
PID:4780
-
-
C:\Users\Admin\AppData\Roaming\Connect.exe"C:\Users\Admin\AppData\Roaming\Connect.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5580f966bca64e1838138589efb274ec3
SHA1d4c22ee1fe9a76fa0f51c1e4d885116b831b9a57
SHA256dba6845453995506c8bfcb417c0fbf741d07bb0484927167d1510f0bb3862686
SHA5120f06f9f31cd9c5140e8a39324cdced94f4da866ec0a7fa39c4f87808aa551460de173413afea7ffe45775100cb4d4cdea8080448bdf25f47a3a1bf309751c090
-
Filesize
3.5MB
MD5849e6926ec1d2ad952623ff4905b869b
SHA14e567998c13dec2ef1f07b2cbf6d642bc1f2468b
SHA25609e8cbc8a6f433619866af77be8ee91c36ebb49aedac1de6f153d47d71e4ff26
SHA512adc24c827245e4b159c7b219d0eddbea6b70039ec83bdf4169bc94d0f4701c249c82a17e553e401d9f62e8dd73d72d5877d86544c1c34b27428a3e206d584fd2