Analysis
-
max time kernel
104s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 22:24
Behavioral task
behavioral1
Sample
bMOw.exe
Resource
win7-20230621-en
4 signatures
150 seconds
General
-
Target
bMOw.exe
-
Size
34KB
-
MD5
a362bfd18383f5536c46431fcc6aab63
-
SHA1
44ba9a386ffa7948f7eb7e0774f2fd4e17990f80
-
SHA256
d3fe679fb3291ccb30e180bc23190e820dec0b357b7b39ab1999908261944d46
-
SHA512
ce4660d0d87e4ba87a82e83c8bf975a821563e5dccbd09086bce180a2442a33b9b9294112f8f15b7921c583e5163d2aaadad985b6aedfa6eda2ad758bd7a215a
-
SSDEEP
768:sTcATS5Ity8aSNIOFM9JTIO9hnSAsRbyy:s42xLNrFM9JTIO91ARbF
Malware Config
Extracted
Family
xworm
C2
64.235.61.43:42069
Mutex
QhYokEqu4q6rkaPE
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1008 bMOw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1008 bMOw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1008 bMOw.exe