Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2023 06:34
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
40KB
-
MD5
64aa45857bbf819ca0516126748ddfdb
-
SHA1
7b57da0f3115410b67456983b72df35c0f168ba8
-
SHA256
02cda252627b911029c6123d83e211312a5bba40b4afcc06d3eb40595f0baee8
-
SHA512
138b7a4e8f07d063240cdb918660682036a13dc4e518095404211c7d67ee34c0620adf344a488f5102c47bdcc68de80584dd3b83f42f35ef0d858541ade6f4d9
-
SSDEEP
768:k1/imAZfCL6p0nMskv+JUBkquxKdVC7kadRzdq2:k9imNPnMtTCTbq2
Malware Config
Extracted
Family
xworm
C2
180.ip.ply.gg:48892
Mutex
QWgaicbZP6H1puz7
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp.exe tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp.exe tmp.exe