Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2023 16:52
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Client.exe
-
Size
58KB
-
MD5
c16d714f359d4659a1f5fef8be99fd30
-
SHA1
791f114b0eca05e9792e3248e3d1bf12faa22d28
-
SHA256
33d49b9ad752f7b92649e62770841545de758850bbeb1ccfc746855f2cebe594
-
SHA512
38d5b7a37836782fc0dbf170273572ffad76827c40c2ca8e73dddd23cfb2642947409200a2dc2e72d19867a5a41c7ab1ce724de1cd40f3be9bb509180a7191bc
-
SSDEEP
768:G+UqXqUDmxqoF2vLSFoRd0Rp0wo3sQhLOqwoE/6DuVWTDqEJPxVchVWTDgV1VaXN:btqFqZWDnc1OkE/6DUUjPxVcjUEP0N
Malware Config
Extracted
Family
xworm
C2
168.119.98.142:4100
Mutex
lZosFAAAHlhl0uFX
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
Processes:
Client.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client.exedescription pid process Token: SeDebugPrivilege 4848 Client.exe