Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 01:40
Behavioral task
behavioral1
Sample
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
Resource
win7-20240419-en
6 signatures
150 seconds
General
-
Target
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
-
Size
34KB
-
MD5
63e46b6425db8622626f0094a49fc323
-
SHA1
fedfcddc9659ec171f40661ad7e375af9be071cc
-
SHA256
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce
-
SHA512
7af3aa00041ec7a77abc45624973b24b747539c3fd8ecefbadc0fc7191d7cd18735a7f77b3f55cfa14d702c6c237722662daa5f4dbdece4f442e4bc41443e807
-
SSDEEP
768:N4fK1pDGkptwyZScCBSUapNgqtRU/kZB+Bcg4tlTF5923UO9hASURJ:NDGkptwyZScCkU4rPUsZIB54HF592kOe
Malware Config
Extracted
Family
xworm
Version
3.1
C2
june9402xw.duckdns.org:9402
Mutex
TAtfGa9f0WCjVzn6
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1636-1-0x0000000000A90000-0x0000000000A9E000-memory.dmp family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1636-1-0x0000000000A90000-0x0000000000A9E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exepid process 1636 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exedescription pid process Token: SeDebugPrivilege 1636 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exepid process 1636 9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe"C:\Users\Admin\AppData\Local\Temp\9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-0-0x00007FFFE3423000-0x00007FFFE3425000-memory.dmpFilesize
8KB
-
memory/1636-1-0x0000000000A90000-0x0000000000A9E000-memory.dmpFilesize
56KB
-
memory/1636-2-0x00007FFFE3420000-0x00007FFFE3EE1000-memory.dmpFilesize
10.8MB
-
memory/1636-3-0x00007FFFE3420000-0x00007FFFE3EE1000-memory.dmpFilesize
10.8MB