Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 02:17
Behavioral task
behavioral1
Sample
tjFUD.exe
Resource
win10v2004-20240426-en
9 signatures
150 seconds
General
-
Target
tjFUD.exe
-
Size
40KB
-
MD5
9126c26063b71116148ea1f40db8c941
-
SHA1
300cdd5589e1ce8642a328f5e80f4246e9d0b062
-
SHA256
28a9ed9884a7f52e49a8026b03b757422a7e3d3a594e6cb7a13946191650b78a
-
SHA512
afff315fdd006cbf2589845700f2433b57c6062497b4f1b59d4096bafe3acee6fca81e4a15f05443dd03f39362eabd0c03312dec6e0dc56d22cb7f9f65071a8f
-
SSDEEP
768:kKpxOlNtidwAmJRXFuO5tF5PT95lvOMh23Ep:k/MWAmJ1FuOLFx95ZOMoW
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:12547
147.185.221.19:12547
bay-currencies.gl.at.ply.gg:12547
and-organized.gl.at.ply.gg:12547
Mutex
T8blWdnjot1TC8dy
Attributes
-
Install_directory
%AppData%
-
install_file
runbroker.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1972-0-0x0000000000830000-0x0000000000840000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runbroker.lnk tjFUD.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runbroker.lnk tjFUD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runbroker = "C:\\Users\\Admin\\AppData\\Roaming\\runbroker.exe" tjFUD.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1972 tjFUD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1972 tjFUD.exe Token: SeDebugPrivilege 1972 tjFUD.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 tjFUD.exe