Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 23:03

General

  • Target

    42 prikolyxa/XWorm V5.2.exe.xml

  • Size

    183B

  • MD5

    66f09a3993dcae94acfe39d45b553f58

  • SHA1

    9d09f8e22d464f7021d7f713269b8169aed98682

  • SHA256

    7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

  • SHA512

    c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

Score
1/10

Malware Config

Signatures

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\42 prikolyxa\XWorm V5.2.exe.xml"
    1⤵
      PID:1536

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1536-1-0x00007FFEAFF0D000-0x00007FFEAFF0E000-memory.dmp

      Filesize

      4KB

    • memory/1536-0-0x00007FFE6FEF0000-0x00007FFE6FF00000-memory.dmp

      Filesize

      64KB

    • memory/1536-2-0x00007FFEAFE70000-0x00007FFEB0065000-memory.dmp

      Filesize

      2.0MB

    • memory/1536-3-0x00007FFEAFE70000-0x00007FFEB0065000-memory.dmp

      Filesize

      2.0MB