Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 12:37
Behavioral task
behavioral1
Sample
triage.exe
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
triage.exe
Resource
android-x64-arm64-20240611.1-en
General
-
Target
triage.exe
-
Size
35KB
-
MD5
6ed00606fe55e314371eea57e9f894e9
-
SHA1
09ea2015a765c09b4cbad59180d9c2ad5633792b
-
SHA256
83ff81c4b95a3b4ba410eb4ef1d2c2a190659b8e1ce888b94cc9e8b4a54abd3d
-
SHA512
692f84d0831a63f17c680597289bd9820c0c4d4ac37964d3b5a7cee6de8c93ff40a0d12fc681cafa49eeb31ad4bf33c1a71fa33e62ff4dd599b215c8691c68e6
-
SSDEEP
768:WoHv9ouQGVGNhiQfCYzZ4mVFy+9FrOjhQOEn:WoHloqGNhVa6Z48Ff9FrOjC
Malware Config
Extracted
xworm
5.0
modern-educators.gl.at.ply.gg:23695
IJhXiQhKv5qiOejO
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5020-1-0x0000000000630000-0x0000000000640000-memory.dmp family_xworm -
Drops startup file 2 IoCs
Processes:
triage.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk triage.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk triage.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
triage.exedescription pid process Token: SeDebugPrivilege 5020 triage.exe Token: SeDebugPrivilege 5020 triage.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5020-0-0x00007FFF45B73000-0x00007FFF45B75000-memory.dmpFilesize
8KB
-
memory/5020-1-0x0000000000630000-0x0000000000640000-memory.dmpFilesize
64KB
-
memory/5020-6-0x00007FFF45B70000-0x00007FFF46632000-memory.dmpFilesize
10.8MB
-
memory/5020-7-0x00007FFF45B70000-0x00007FFF46632000-memory.dmpFilesize
10.8MB
-
memory/5020-9-0x00000000027D0000-0x00000000027DC000-memory.dmpFilesize
48KB
-
memory/5020-12-0x00007FFF45B70000-0x00007FFF46632000-memory.dmpFilesize
10.8MB