Analysis
-
max time kernel
30s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:45
Behavioral task
behavioral1
Sample
shadow.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
30 seconds
Behavioral task
behavioral2
Sample
shadow.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
3 signatures
30 seconds
General
-
Target
shadow.exe
-
Size
40KB
-
MD5
4afda090eb6b598567ea78e107091de8
-
SHA1
7552d66d51bc5f1be8a55e80bce3cb5af0460ce0
-
SHA256
2351e582e18b9192f76ef1d887dd377cc2f794c6011ac98eed8d6a049352f864
-
SHA512
4ddbb8798171d85654cc6aacabb159290ec4fd8862f67a47df1c620e661c1e7fbe15f2ac75fcb14ad1999750d1624dde7a1569d7a35be5b0f528143f8f3cca03
-
SSDEEP
768:zfw749swluM7R1Acpo+I2tGcy97KdV2UiPNRSy:zs4iA7R1Atr2yOZgky
Score
10/10
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Mutex
SMSuhNoQkgRxeqPg
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
Processes:
shadow.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\shadow.exe shadow.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\shadow.exe shadow.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
shadow.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shadow = "C:\\Users\\Admin\\AppData\\Roaming\\shadow.exe" shadow.exe