Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18-07-2023 06:32
General
-
Target
33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe
-
Size
58KB
-
MD5
c16d714f359d4659a1f5fef8be99fd30
-
SHA1
791f114b0eca05e9792e3248e3d1bf12faa22d28
-
SHA256
33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594
-
SHA512
38d5b7a37836782fc0dbf170273572ffad76827c40c2ca8e73dddd23cfb2642947409200a2dc2e72d19867a5a41c7ab1ce724de1cd40f3be9bb509180a7191bc
-
SSDEEP
768:G+UqXqUDmxqoF2vLSFoRd0Rp0wo3sQhLOqwoE/6DuVWTDqEJPxVchVWTDgV1VaXN:btqFqZWDnc1OkE/6DUUjPxVcjUEP0N
Malware Config
Extracted
Family
xworm
C2
168.119.98.142:4100
Mutex
lZosFAAAHlhl0uFX
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
Processes:
33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe 33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe 33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exedescription pid process Token: SeDebugPrivilege 4916 33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594.exe