Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
EC.exe
Resource
win10v2004-20250217-en
General
-
Target
EC.exe
-
Size
606KB
-
MD5
a360792e294edd8b69a58abf9792e0ab
-
SHA1
92d7bf026f2690e0955ad40a06450478e2a2169f
-
SHA256
e1969f5cf0a443b9d7416122f6a93da6847abe2a6f098c4088cc93aa0ff54324
-
SHA512
991fa53dbede43a38acf1d1ddf575add1e26cd78b5ae517ca68148e5f3d8087b0261695744482ba2f6f30fcdad7be6b555bae5ae73ed07f099a55e11bda26cb7
-
SSDEEP
12288:ylebH7ETMiQU1mTUBF8YcjXuQwYVl6ai/emTUBjO3AWQlOrRFR:ylM7Ezv8YczuQTlFi/eQmO3AGrRFR
Malware Config
Extracted
xworm
2.58.56.237:53
-
Install_directory
%AppData%
-
install_file
Svhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00050000000229c7-6.dat family_xworm behavioral1/memory/2236-18-0x0000000000F40000-0x0000000000F58000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation EC.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 XClient.exe 3944 Cheat-Made-by-Covllld;).exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3944 Cheat-Made-by-Covllld;).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 XClient.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1468 wrote to memory of 2236 1468 EC.exe 87 PID 1468 wrote to memory of 2236 1468 EC.exe 87 PID 1468 wrote to memory of 3944 1468 EC.exe 88 PID 1468 wrote to memory of 3944 1468 EC.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\EC.exe"C:\Users\Admin\AppData\Local\Temp\EC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\Cheat-Made-by-Covllld;).exe"C:\Users\Admin\AppData\Roaming\Cheat-Made-by-Covllld;).exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD551a539469ad26aa790469eda6863133b
SHA1b8b3101384192da1d2a4a4475bbddd67a487b621
SHA2563d09d48543c6b5ec47551237974af3de97528c8f5223f23a93830c0f4f8d7971
SHA51229b7cd9823a97f2587c4fd54119fcb536daa68c74a5a0bd16d00d96921a43833f4c66146202509d8e9cd5ce48e62e7a8af2ad8b346794e14083460fed42ab9df
-
Filesize
72KB
MD52c5da7d66b8db9b983dd5ee0e1b40bd6
SHA13c10875859a68bbef32c93035ac54a7cd9bd44ff
SHA256ba633233cd70a59416eede6d0036f89fc8ebcbe14f2079076ccf78749f9de087
SHA512f06f47540e0d2404aae7605926b4bec68b7f3f45cf4d77e4aa141632eadcdbd2a6517c64f97842f772a9a8cb5a3283e245992e8085c931935cb3f92aabb44686