Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 11:00
Behavioral task
behavioral1
Sample
1688810168c4038a329ed95eb.exe
Resource
win7-20230703-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1688810168c4038a329ed95eb.exe
-
Size
35KB
-
MD5
10abee80a547dd66eca1983a94f9079d
-
SHA1
8bc0c7f3e1bf2d0f9a1cf6a3b5e568f0a4138c98
-
SHA256
fe26435d736490783cb2b71faa85b79f858fa45dfd81bdafcc5e65f0b837cf3f
-
SHA512
98426ed5ab1099cab32b81261066d8b9951b1fde24be8915b992870662e91c3b0919531584c66072db46791f6b4d29b5cd6c7babe727845e7f7c243128b439c4
-
SSDEEP
384:pNg8ssvG79ki23FNxPLenaM9+OTTwNfbXmXL3sVgtFMA4P6NLTBZw/RZIvK9IkEY:smW98enaM9twsNFWP39g4s5OMhd9QoO
Malware Config
Extracted
Family
xworm
C2
jeanjaques.ddns.net:9900
Mutex
eJt8izIiSX6los2K
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1688810168c4038a329ed95eb.lnk 1688810168c4038a329ed95eb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1688810168c4038a329ed95eb.lnk 1688810168c4038a329ed95eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4660 1688810168c4038a329ed95eb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4660 1688810168c4038a329ed95eb.exe Token: SeDebugPrivilege 4660 1688810168c4038a329ed95eb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4660 1688810168c4038a329ed95eb.exe