Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 18:48
Behavioral task
behavioral1
Sample
.netframework4.1.1.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
.netframework4.1.1.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
.netframework4.1.1.exe
-
Size
35KB
-
MD5
06cd4891e0196388ed804a8d138da64c
-
SHA1
d2ab89cec928c536cc748795aa2683e452e9f0a2
-
SHA256
c625094a95eef5285aede457763382e9d56f1ae02eebe6c6ca123aeff6fa069b
-
SHA512
054d49b00197487772a29516d2d29e6c113e2468acb918351398edf4ad2d87c7e26ec6c10923813ca99dfe7b92327a5a76ddcdb35ca65994298961740bf35803
-
SSDEEP
768:ldvNjTsiPrGiB7Fyva4VFyv9e6Ojhym3:ldaOf7SaGFY9e6OjH
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
192.168.1.109:7000
Mutex
J5mD3hKJ09FsHfoz
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/988-1-0x00000000006F0000-0x0000000000700000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurity.lnk .netframework4.1.1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurity.lnk .netframework4.1.1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsSecurity = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsSecurity" .netframework4.1.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 988 .netframework4.1.1.exe Token: SeDebugPrivilege 988 .netframework4.1.1.exe