Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 01:53
Behavioral task
behavioral1
Sample
531fb63826f4d36eb31debe554073a4f4a73eaca264699b21e24e912b831f81a.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
531fb63826f4d36eb31debe554073a4f4a73eaca264699b21e24e912b831f81a.exe
-
Size
33KB
-
MD5
df6e8e8955acdb9b0864f25d442f43c5
-
SHA1
d984a3b537114a8005a59e922c4cbaec6f3dcd2c
-
SHA256
531fb63826f4d36eb31debe554073a4f4a73eaca264699b21e24e912b831f81a
-
SHA512
9cef337e429b150295579c0387f06b3d4aa0cfccc92747c1a783023425d4bb0cc1f060a643294c7baf38b837cbe4eedf4de8a1b5d99af96ac2aaf794e7919f56
-
SSDEEP
384:Jl+PkjD9+E5MFs7iui8L7zKM42pfL3iB7OxVqWFiRApkFXBLTsOZwpGN2v99Ikuo:r+CD93W03v42JiB70SVF49jocOjhQbN
Malware Config
Extracted
Family
xworm
Version
5.0
C2
warzones12.duckdns.org:7000
Mutex
zE2l9o6TPb8JbyzU
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2652-0-0x0000000000CC0000-0x0000000000CCE000-memory.dmp family_xworm -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 531fb63826f4d36eb31debe554073a4f4a73eaca264699b21e24e912b831f81a.exe