Resubmissions

07-04-2024 11:37

240407-nrb24abg9x 10

09-10-2023 19:06

231009-xsc58aff91 10

09-10-2023 19:00

231009-xnxn3ahg55 10

09-10-2023 18:59

231009-xncc5aff7x 10

01-10-2023 10:08

231001-l6g6jsaa3t 10

Analysis

  • max time kernel
    1387s
  • max time network
    1158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2023 19:06

General

  • Target

    XWorm V5.0_Cracked/XWorm V5.0/MonoMod.Iced.dll

  • Size

    623KB

  • MD5

    c24584c6b5bc57ac46727ab15e332c4a

  • SHA1

    dadd68f0fa45845fbc30fd0f8f54e8616cdd2d0b

  • SHA256

    ef4a8f28226db390dd07de13afc01c8000e127c978ebf428a6637f39ac277033

  • SHA512

    aabc699eef08e3483049c7ceb48842deddc52284de7f6f72d56d6eccac3989cc373839aeac61f03e7b2af203744d579fd96a4eb911cfdd0461b151c41dc6771d

  • SSDEEP

    6144:Xw98C3SQzlfuStslPYAH+jUmLdf26bfDcj2511Qxu7F:q8CCYlfuGslPn+jvDTDcj251+xuR

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\XWorm V5.0_Cracked\XWorm V5.0\MonoMod.Iced.dll",#1
    1⤵
      PID:1416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:2228
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5096

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5096-0-0x0000027959350000-0x0000027959360000-memory.dmp

        Filesize

        64KB

      • memory/5096-16-0x0000027959450000-0x0000027959460000-memory.dmp

        Filesize

        64KB

      • memory/5096-32-0x00000279617C0000-0x00000279617C1000-memory.dmp

        Filesize

        4KB

      • memory/5096-34-0x00000279617F0000-0x00000279617F1000-memory.dmp

        Filesize

        4KB

      • memory/5096-35-0x00000279617F0000-0x00000279617F1000-memory.dmp

        Filesize

        4KB

      • memory/5096-36-0x0000027961900000-0x0000027961901000-memory.dmp

        Filesize

        4KB