Resubmissions

23/06/2024, 11:45

240623-nwp5hstaqp 10

22/06/2024, 22:40

240622-2lpb5axgle 10

22/06/2024, 22:29

240622-2epz3sxdmh 10

22/06/2024, 22:12

240622-14q31awgnf 10

22/06/2024, 22:02

240622-1x59cawdqf 10

22/06/2024, 22:00

240622-1wyg4swdlc 10

Analysis

  • max time kernel
    23s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/06/2024, 22:40

General

  • Target

    Runtime Broker.exe

  • Size

    72KB

  • MD5

    89af2aaffc3ddda07a0fc977c8bb2236

  • SHA1

    412bd5812599d5729a51d0350df48030b0d04e1a

  • SHA256

    637aff987be6ea158b7182de9de5de0054407077511019516270d82a6f2e9b69

  • SHA512

    8c2b26d0f1b0ae80149a2aaadef329ab7fb3495bdfbccb7f8ff60368094cd955829b2cb1217b16808ac41a223661d48c2dcf88d3daeddc6b699aa88272be75ae

  • SSDEEP

    1536:b0nLpERHZ5P56srqpbTXw3cYUo6IfI4WOyL6KqGi:bcY7P56tbTXb6IvOyyGi

Score
10/10

Malware Config

Extracted

Family

xworm

C2

medical-m.gl.at.ply.gg:28857

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Runtime Broker.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
    "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-0-0x000007FEF5BE3000-0x000007FEF5BE4000-memory.dmp

    Filesize

    4KB

  • memory/1644-1-0x00000000008C0000-0x00000000008D8000-memory.dmp

    Filesize

    96KB

  • memory/1644-2-0x000007FEF5BE3000-0x000007FEF5BE4000-memory.dmp

    Filesize

    4KB