Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 14:35
Behavioral task
behavioral1
Sample
f55d89f82515bde23bb272f930cb9492.exe
Resource
win7-20240221-en
General
-
Target
f55d89f82515bde23bb272f930cb9492.exe
-
Size
36KB
-
MD5
f55d89f82515bde23bb272f930cb9492
-
SHA1
666d0f5a98f03292abf16cd2de599997c836926a
-
SHA256
4d9fb14e15d1613a7a5d70efbacb0f153729f02216116c3f7f117b033bd7655c
-
SHA512
a7a62daf90aae27207b77034e8a76d5b3f8aa05430bd8768d46be7f3843962ddc1ef154691dc0f26051605fbb36269e59f18c3c75fdf72222346188e7a6cf03b
-
SSDEEP
384:/IFAz8mqQNv9qNx7kKka/sVxCTjMBVJYX7+u91X5Lj6WmyyNApPzuSvZ5mpkFyHZ:EApN1/qEMFj60y+hLFyT9CCOjhyPy2B
Malware Config
Extracted
xworm
5.0
85.203.4.146:7000
eItTbYBfBYihwkyW
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2084-1-0x0000000000AB0000-0x0000000000AC0000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk f55d89f82515bde23bb272f930cb9492.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk f55d89f82515bde23bb272f930cb9492.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 f55d89f82515bde23bb272f930cb9492.exe Token: SeDebugPrivilege 2084 f55d89f82515bde23bb272f930cb9492.exe