Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-06-2024 13:17

General

  • Target

    XWorm V5.0.exe

  • Size

    10.4MB

  • MD5

    18d48ecc5c00fd8cefcfa05a66a56d36

  • SHA1

    037c4f3694f1c6c9add0f0da60ecd2d24e75d85c

  • SHA256

    41618dd526b6c3c8bb97a06c4875c342cd0e955194feea208261516f8c703a98

  • SHA512

    135317987dcbfd4953317582ca19fb9275e90bfc4d717728acdc326a144c8a6834d55071b9ab701a5a7cf192339f9e010eb3534b0a6200fade9bb53f60a7fd48

  • SSDEEP

    196608:z59nhcOWSxxgQHl2np1eY5J5itQaZWtU8i/MJ:zRRWQBQnpji1W+8i/

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm V5.0.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm V5.0.exe"
    1⤵
      PID:2404

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2404-0-0x00007FF99A1F3000-0x00007FF99A1F4000-memory.dmp
      Filesize

      4KB

    • memory/2404-1-0x0000028A3B290000-0x0000028A3BD02000-memory.dmp
      Filesize

      10.4MB