Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/04/2024, 14:22

General

  • Target

    planetx_loader_crack.exe

  • Size

    138KB

  • MD5

    aa5acfcc04c0d2612b06a9aa800ef0f7

  • SHA1

    291f3cc04f2973b5bbf70e7e04ac51ce8d8a2c1f

  • SHA256

    971ff1183980dc1211bd71e2993b441df7fc082ac362c1964f5278fcf093d026

  • SHA512

    24772ebab68740405ccc77027f3f4e022d37dfe7cb69d6f2a555191142ea936b8761850db37c1d2070f30e53c0f1bce74e948259930403d632a6d7715242cb32

  • SSDEEP

    3072:TayC6ykbvcOznBz65/M6If+3Js+3JFkKeTnu:Tg6bdxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:3878

understand-heroes.gl.at.ply.gg:3878

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\planetx_loader_crack.exe
    "C:\Users\Admin\AppData\Local\Temp\planetx_loader_crack.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4896
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4896-0-0x0000000000C40000-0x0000000000C68000-memory.dmp

          Filesize

          160KB

        • memory/4896-1-0x00007FFEA40A0000-0x00007FFEA4A8C000-memory.dmp

          Filesize

          9.9MB

        • memory/4896-2-0x000000001B890000-0x000000001B8A0000-memory.dmp

          Filesize

          64KB

        • memory/4896-10-0x00007FFEA40A0000-0x00007FFEA4A8C000-memory.dmp

          Filesize

          9.9MB

        • memory/4896-11-0x000000001B890000-0x000000001B8A0000-memory.dmp

          Filesize

          64KB