Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 01:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe
-
Size
142KB
-
MD5
c00217935070f3582e3e7352f9d4b33a
-
SHA1
a4a01d96f20c1858b2327d3cc42d9633e0c9c715
-
SHA256
87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1
-
SHA512
89e90e99ffd9a35512e44dd83a9dc7bbab213fa6ad6758dd11225a4615ee165e757d71057e3e6c21198120babbeee46e5217ff05494229f8ab602c5d71c1e190
-
SSDEEP
3072:kglFIo1nWg7NBWM8kWCZRTdkS6I81QcLLP9JurW2N8BJ:dlF2gjTdoLz9CW
Malware Config
Extracted
Family
xworm
Version
3.1
C2
107.150.19.19:7000
Mutex
xX4ZsXt0UfSKdG38
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2004-8-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2004-9-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2004-12-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2004-14-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2004-16-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28 PID 2748 wrote to memory of 2004 2748 87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe"C:\Users\Admin\AppData\Local\Temp\87fcd72d5a220af7e19b13236a28a6258e38cf6040f03cdb7fff46d98f01b0b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
-