Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 01:44

General

  • Target

    3f4351c659701ecbc9165d8a0cbdbc97.exe

  • Size

    55KB

  • MD5

    3f4351c659701ecbc9165d8a0cbdbc97

  • SHA1

    2aa971037201e78b5b2f36432eeffaf4d0586256

  • SHA256

    bdb75df709e35babd74de16668d5d4fbd458d6d21c9adccc5ee72bb9d9f76746

  • SHA512

    972c96d9dd5384e71df9e9e5a4fb3b9bf345b8a9e8df6ac7a9d8a52e287dc7167a447d690a75f48228cabc8d1a34504abd5bd10bd2c79dbfa30776babf4e260b

  • SSDEEP

    1536:NlLhOi/dkCOHVWkNfx3nKn4yYWRhuyOOVPH:ffcWOfx1WRhuyOOVPH

Score
10/10

Malware Config

Extracted

Family

xworm

C2

amazonshipping.duckdns.org:7000

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    MSBuild.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4351c659701ecbc9165d8a0cbdbc97.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4351c659701ecbc9165d8a0cbdbc97.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-0-0x0000000000B10000-0x0000000000B24000-memory.dmp

    Filesize

    80KB

  • memory/1768-1-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

    Filesize

    9.9MB

  • memory/1768-6-0x000000001B300000-0x000000001B380000-memory.dmp

    Filesize

    512KB

  • memory/1768-7-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

    Filesize

    9.9MB