Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
884df6eceba6d2ce19b3994945d37fd2487a012c64345939d9398f6001bf4e51.exe
Resource
win7-20240508-en
General
-
Target
884df6eceba6d2ce19b3994945d37fd2487a012c64345939d9398f6001bf4e51.exe
-
Size
2.2MB
-
MD5
d46c0c68803203f7db45a78a0e02225f
-
SHA1
9d198155dd59799ffd16397243b5047d7208800a
-
SHA256
884df6eceba6d2ce19b3994945d37fd2487a012c64345939d9398f6001bf4e51
-
SHA512
3811e601f7dab65bbd8c4b63cb91355b5da16de4528f8f14a941aa73f7bd973876dfd7aab5606d27bfcb9c0e7584317d8337151500d777e4fe455df090e56085
-
SSDEEP
12288:tOnWCm5n3D7ofordCP4MmT9cFTf7GvgV1JQ5mc7h9bSe/zMn:
Malware Config
Extracted
xworm
3.1
adult-purchased.gl.at.ply.gg:13795
SDsGs8jdu1MveW6y
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-2-0x0000000000B80000-0x0000000000B8E000-memory.dmp family_xworm -
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-3-0x000000001B020000-0x000000001B0F0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-2-0x0000000000B80000-0x0000000000B8E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-3-0x000000001B020000-0x000000001B0F0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
884df6eceba6d2ce19b3994945d37fd2487a012c64345939d9398f6001bf4e51.exedescription pid process Token: SeDebugPrivilege 3652 884df6eceba6d2ce19b3994945d37fd2487a012c64345939d9398f6001bf4e51.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3652-0-0x00007FFE899C3000-0x00007FFE899C5000-memory.dmpFilesize
8KB
-
memory/3652-1-0x00000000001A0000-0x00000000003D6000-memory.dmpFilesize
2.2MB
-
memory/3652-2-0x0000000000B80000-0x0000000000B8E000-memory.dmpFilesize
56KB
-
memory/3652-3-0x000000001B020000-0x000000001B0F0000-memory.dmpFilesize
832KB
-
memory/3652-4-0x00007FFE899C0000-0x00007FFE8A481000-memory.dmpFilesize
10.8MB
-
memory/3652-5-0x00007FFE899C3000-0x00007FFE899C5000-memory.dmpFilesize
8KB
-
memory/3652-6-0x00007FFE899C0000-0x00007FFE8A481000-memory.dmpFilesize
10.8MB