Analysis

  • max time kernel
    244s
  • max time network
    254s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-06-2024 12:15

General

  • Target

  • Size

    35KB

  • MD5

    29c0b07dd4292bfd7b4fef87afc37eba

  • SHA1

    fdac36a0930b1d0294ee84062c821e4f363fd142

  • SHA256

    c471bf614dcc7041104247415092c5d5e39d6880d94e2269bc0b0cb37bdafae4

  • SHA512

    70d72db2359cc3bc6ecdd29889648c29bd95027d5a2a4bc55612ab61aa50badd8a123b0198b4426125b6f9c19e860a04808e9f307209afee43fb68ce3c0d20bd

  • SSDEEP

    768:NoHv9ouQGVEhiQfCYzseVFy+9FpOjhnOEE:NoHloqEhVa6sUFf9FpOj4

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

modern-educators.gl.at.ply.gg:23695

Mutex

secFxYhGeDMYM19Q

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:5064

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-1-0x0000000000C90000-0x0000000000CA0000-memory.dmp
    Filesize

    64KB

  • memory/5064-0-0x00007FFAD9D13000-0x00007FFAD9D15000-memory.dmp
    Filesize

    8KB

  • memory/5064-6-0x00007FFAD9D10000-0x00007FFADA7D2000-memory.dmp
    Filesize

    10.8MB

  • memory/5064-7-0x00007FFAD9D10000-0x00007FFADA7D2000-memory.dmp
    Filesize

    10.8MB