Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 06:15
Behavioral task
behavioral1
Sample
6ef1e04016619a23768fbb6ace3c5be5.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6ef1e04016619a23768fbb6ace3c5be5.exe
-
Size
40KB
-
MD5
6ef1e04016619a23768fbb6ace3c5be5
-
SHA1
ff55539983748794a28d562cbaafed63518d6f49
-
SHA256
36744630552440395ca6062a6a6b6634791193afc423bd77c9eea84f210cfb83
-
SHA512
c377825399f4050a3f52e4aa61de84cbc62bfe41d4f8a5261425f8cf523561a3ac68f215ae0db6daed3d6272c7665275125fbbd460d0ac499caf94e69260bf84
-
SSDEEP
768:L8UqXqUDmxqoF2vfSVoRT0Rp0wR5xsQhLOkwoE/69:ItqFqZipRRj1OKE/69
Malware Config
Extracted
Family
xworm
C2
149.102.231.91:5000
Mutex
EFRo3ghjj1iCQ730
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6ef1e04016619a23768fbb6ace3c5be5.exe 6ef1e04016619a23768fbb6ace3c5be5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6ef1e04016619a23768fbb6ace3c5be5.exe 6ef1e04016619a23768fbb6ace3c5be5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2312 6ef1e04016619a23768fbb6ace3c5be5.exe