Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
EC.exe
Resource
win7-20240903-en
General
-
Target
EC.exe
-
Size
606KB
-
MD5
a360792e294edd8b69a58abf9792e0ab
-
SHA1
92d7bf026f2690e0955ad40a06450478e2a2169f
-
SHA256
e1969f5cf0a443b9d7416122f6a93da6847abe2a6f098c4088cc93aa0ff54324
-
SHA512
991fa53dbede43a38acf1d1ddf575add1e26cd78b5ae517ca68148e5f3d8087b0261695744482ba2f6f30fcdad7be6b555bae5ae73ed07f099a55e11bda26cb7
-
SSDEEP
12288:ylebH7ETMiQU1mTUBF8YcjXuQwYVl6ai/emTUBjO3AWQlOrRFR:ylM7Ezv8YczuQTlFi/eQmO3AGrRFR
Malware Config
Extracted
xworm
2.58.56.237:53
-
Install_directory
%AppData%
-
install_file
Svhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120f4-5.dat family_xworm behavioral1/memory/3044-11-0x0000000000980000-0x0000000000998000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 3044 XClient.exe 2552 Cheat-Made-by-Covllld;).exe -
Loads dropped DLL 1 IoCs
pid Process 1696 EC.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 XClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3044 1696 EC.exe 30 PID 1696 wrote to memory of 3044 1696 EC.exe 30 PID 1696 wrote to memory of 3044 1696 EC.exe 30 PID 1696 wrote to memory of 2552 1696 EC.exe 31 PID 1696 wrote to memory of 2552 1696 EC.exe 31 PID 1696 wrote to memory of 2552 1696 EC.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\EC.exe"C:\Users\Admin\AppData\Local\Temp\EC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\Cheat-Made-by-Covllld;).exe"C:\Users\Admin\AppData\Roaming\Cheat-Made-by-Covllld;).exe"2⤵
- Executes dropped EXE
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD551a539469ad26aa790469eda6863133b
SHA1b8b3101384192da1d2a4a4475bbddd67a487b621
SHA2563d09d48543c6b5ec47551237974af3de97528c8f5223f23a93830c0f4f8d7971
SHA51229b7cd9823a97f2587c4fd54119fcb536daa68c74a5a0bd16d00d96921a43833f4c66146202509d8e9cd5ce48e62e7a8af2ad8b346794e14083460fed42ab9df
-
Filesize
72KB
MD52c5da7d66b8db9b983dd5ee0e1b40bd6
SHA13c10875859a68bbef32c93035ac54a7cd9bd44ff
SHA256ba633233cd70a59416eede6d0036f89fc8ebcbe14f2079076ccf78749f9de087
SHA512f06f47540e0d2404aae7605926b4bec68b7f3f45cf4d77e4aa141632eadcdbd2a6517c64f97842f772a9a8cb5a3283e245992e8085c931935cb3f92aabb44686