Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 16:54
Behavioral task
behavioral1
Sample
0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe
-
Size
37KB
-
MD5
ffc433cc5b446ea470c8ce98edd7c248
-
SHA1
90248c2c85885af789ca75053438c77c7512fbac
-
SHA256
0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d
-
SHA512
0b085028dabe75bb22480b75191555dcfbf53c6caccd097375c632f34c47fb49ab4c24d2d4db7f6ffeb00b12184b2d433b70d00d86615485e7f7f76a52547a94
-
SSDEEP
384:xeOSrHiWIjrdTadLwxwCUOCFFniFyNd9jMJrqpkFE+LT/OZwEci2v99Ik1is+Pja:HrtcCSFniFyh2dFh9gjO1h1qVgXj
Malware Config
Extracted
Family
xworm
Version
5.0
C2
137.184.9.205:7000
Mutex
bV5QPxwLtEpuTDDi
Attributes
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6567817661:AAEPVH8mr4mtxVjaqzlho_8xxGuixiJIukE
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2220-0-0x0000000000D50000-0x0000000000D60000-memory.dmp family_xworm -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2220 0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe"C:\Users\Admin\AppData\Local\Temp\0ba64202181094b72f8db073c627de074bd18ef9f977d42e12de6d6478ff283d.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2220