Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_7131fce89e2cc71e5a58ed59f59a554a_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-25_7131fce89e2cc71e5a58ed59f59a554a_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_7131fce89e2cc71e5a58ed59f59a554a_mafia.exe
-
Size
151KB
-
MD5
7131fce89e2cc71e5a58ed59f59a554a
-
SHA1
2d2b3aab3b6093a5601b864533298395e9439837
-
SHA256
8fb42fce64221d34dcc5df9652def123824622d01bea6e725e0e4e6409cc127e
-
SHA512
2431ec7fa3b75f620849df1524a8dda2b82e33050792c0fa3f75a1c28c05446116d390ede2eff1929a9a539666bb27d3a70d6ed9c0f8a6fd578bbee13dafc0e4
-
SSDEEP
3072:mIl5inuAp3GutQuxQbC/46U18j5WHv+2JJlBtQ:m9npxt9v46ZK+2XS
Malware Config
Extracted
xworm
5.0
117.41.184.248:7000
z7TTmNyADbalYrER
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2004-5-0x0000000000910000-0x000000000091E000-memory.dmp family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral1/memory/2004-5-0x0000000000910000-0x000000000091E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 2024-06-25_7131fce89e2cc71e5a58ed59f59a554a_mafia.exe