Analysis

  • max time kernel
    122s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 01:41

General

  • Target

    d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51.exe

  • Size

    755KB

  • MD5

    a8f5eb653b660a24e0a0017c684c1b96

  • SHA1

    4b75c2c8dba5f4198873a8ed0e0c4d2bf146d881

  • SHA256

    d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51

  • SHA512

    0ff6026999fee1e6456a6557a82079a03622480edfd5aef9f7c1e3b03266a1e589fc4b3eb4568f3bec9f5f5f439f58aa313c8409241cbe4e1ffc1043c66a0b01

  • SSDEEP

    12288:HwglEe171o1+1k155scBRTWgwxPzDnkbIStV4bkX7cst2Ket3D6ohYc8A4isx:CnNKkbI0NjKRs

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

dav12221.duckdns.org:7000

Mutex

VnoSv30JNEHEbKof

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 5 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51.exe
      "C:\Users\Admin\AppData\Local\Temp\d4d4c8f1217f38de76b3ba26865db8460987a0877ba70eb70f25fef6f5756c51.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2728-0-0x0000000000AC0000-0x0000000000B84000-memory.dmp

    Filesize

    784KB

  • memory/2728-1-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2728-2-0x00000000003E0000-0x000000000041E000-memory.dmp

    Filesize

    248KB

  • memory/2728-3-0x0000000004B30000-0x0000000004B70000-memory.dmp

    Filesize

    256KB

  • memory/2728-4-0x0000000000660000-0x0000000000668000-memory.dmp

    Filesize

    32KB

  • memory/2728-20-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2980-17-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-19-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-15-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2980-11-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-9-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-7-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-5-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2980-21-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2980-22-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2980-23-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2980-24-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB