Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2023 11:00

General

  • Target

    1688810168c4038a329ed95eb.exe

  • Size

    35KB

  • MD5

    10abee80a547dd66eca1983a94f9079d

  • SHA1

    8bc0c7f3e1bf2d0f9a1cf6a3b5e568f0a4138c98

  • SHA256

    fe26435d736490783cb2b71faa85b79f858fa45dfd81bdafcc5e65f0b837cf3f

  • SHA512

    98426ed5ab1099cab32b81261066d8b9951b1fde24be8915b992870662e91c3b0919531584c66072db46791f6b4d29b5cd6c7babe727845e7f7c243128b439c4

  • SSDEEP

    384:pNg8ssvG79ki23FNxPLenaM9+OTTwNfbXmXL3sVgtFMA4P6NLTBZw/RZIvK9IkEY:smW98enaM9twsNFWP39g4s5OMhd9QoO

Score
10/10

Malware Config

Extracted

Family

xworm

C2

jeanjaques.ddns.net:9900

Mutex

eJt8izIiSX6los2K

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1688810168c4038a329ed95eb.exe
    "C:\Users\Admin\AppData\Local\Temp\1688810168c4038a329ed95eb.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4660-133-0x0000000000950000-0x0000000000960000-memory.dmp

    Filesize

    64KB

  • memory/4660-138-0x000000001B490000-0x000000001B4A0000-memory.dmp

    Filesize

    64KB

  • memory/4660-139-0x000000001B490000-0x000000001B4A0000-memory.dmp

    Filesize

    64KB