Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 01:40
Behavioral task
behavioral1
Sample
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
Resource
win7-20240419-en
6 signatures
150 seconds
General
-
Target
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
-
Size
34KB
-
MD5
63e46b6425db8622626f0094a49fc323
-
SHA1
fedfcddc9659ec171f40661ad7e375af9be071cc
-
SHA256
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce
-
SHA512
7af3aa00041ec7a77abc45624973b24b747539c3fd8ecefbadc0fc7191d7cd18735a7f77b3f55cfa14d702c6c237722662daa5f4dbdece4f442e4bc41443e807
-
SSDEEP
768:N4fK1pDGkptwyZScCBSUapNgqtRU/kZB+Bcg4tlTF5923UO9hASURJ:NDGkptwyZScCkU4rPUsZIB54HF592kOe
Malware Config
Extracted
Family
xworm
Version
3.1
C2
june9402xw.duckdns.org:9402
Mutex
TAtfGa9f0WCjVzn6
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2164-1-0x0000000000F10000-0x0000000000F1E000-memory.dmp family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2164-1-0x0000000000F10000-0x0000000000F1E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exepid process 2164 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exedescription pid process Token: SeDebugPrivilege 2164 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exepid process 2164 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe"C:\Users\Admin\AppData\Local\Temp\9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2164-0-0x000007FEF5C23000-0x000007FEF5C24000-memory.dmpFilesize
4KB
-
memory/2164-1-0x0000000000F10000-0x0000000000F1E000-memory.dmpFilesize
56KB
-
memory/2164-2-0x000007FEF5C23000-0x000007FEF5C24000-memory.dmpFilesize
4KB
-
memory/2164-3-0x000007FEF5C20000-0x000007FEF660C000-memory.dmpFilesize
9.9MB
-
memory/2164-4-0x000007FEF5C20000-0x000007FEF660C000-memory.dmpFilesize
9.9MB