Analysis Overview
SHA256
55c256c6d8ba0ed731f3fcfe5c2f25c0020b92167b1bc84cd286da660a64cce5
Threat Level: Known bad
The file 1e3784e2eb9c27d3ca87b2df1946ab94.bin was found to be: Known bad.
Malicious Activity Summary
Detect Xworm Payload
Xworm
Xworm family
Looks up external IP address via web service
Unsigned PE
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-11 01:41
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 01:41
Reported
2024-06-11 01:44
Platform
win7-20240508-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe
"C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| US | 8.8.8.8:53 | lower-fisheries.gl.at.ply.gg | udp |
Files
memory/2164-0-0x000007FEF5193000-0x000007FEF5194000-memory.dmp
memory/2164-1-0x0000000001000000-0x0000000001010000-memory.dmp
memory/2164-2-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp
memory/2164-3-0x000007FEF5193000-0x000007FEF5194000-memory.dmp
memory/2164-4-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 01:41
Reported
2024-06-11 01:44
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe
"C:\Users\Admin\AppData\Local\Temp\1e3784e2eb9c27d3ca87b2df1946ab94.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
Files
memory/116-0-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmp
memory/116-1-0x0000000000050000-0x0000000000060000-memory.dmp
memory/116-2-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp
memory/116-3-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp