Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:04
Behavioral task
behavioral1
Sample
50dba3ff74554784188cfd0378fab8f6.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
50dba3ff74554784188cfd0378fab8f6.exe
-
Size
62KB
-
MD5
50dba3ff74554784188cfd0378fab8f6
-
SHA1
a7ae36030735d467941fef67fc15287502eb1e44
-
SHA256
f09865a6131f85f939a92745531a23d9c6638a4e4d63e98dea5660ad86378894
-
SHA512
39f1d8acca12514cee7f6f9aad41ccdf38a674379c2d2e9008447e232b065afed59e82c7c59b6bdda5b02b1824af5f31e5e807576069eb266526f2f3af83e4e7
-
SSDEEP
1536:3mxP2qSKiiVQlyZrMkbKj7SdnAORTla6x:3loiBVkbKKKORTlRx
Malware Config
Extracted
Family
xworm
C2
194.59.30.91:4040
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2888-1-0x0000000000D30000-0x0000000000D46000-memory.dmp family_xworm -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 50dba3ff74554784188cfd0378fab8f6.exe Token: SeDebugPrivilege 2888 50dba3ff74554784188cfd0378fab8f6.exe