Analysis

  • max time kernel
    117s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 16:32

General

  • Target

    1220.exe

  • Size

    33KB

  • MD5

    746577f77d116be5548fe36ecf69653e

  • SHA1

    ff8b367092c14c31b3f11e633248d0913f65a94f

  • SHA256

    fdc004f1ae0e35bb9876ef0764d45841551f06cdb20a9f749ef5e9e3f8ec0215

  • SHA512

    8534745bc6e0fcdaf10d2a7e557ded0a0f9053dd238e2534989fa10894aa9ce1370dadc4515f0696f49454e30495b95a11138e9e203b85a301b20305a4f06f4a

  • SSDEEP

    384:kkmaqH1PJUt8bOoTz5LzNz3Tm2eaFOzFzRApkFTBLTsOZwpGd2v99IkuisHfYVFS:ZiHDD5FZz3Tw4OFzVFE9jefKOjhwbm

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

wafflemafia.top:1220

honesty24.duckdns.org:1220

havertz.duckdns.org:1220

freedom24.duckdns.org:1220

Mutex

sNb0G0pWm5AOvhqF

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1220.exe
    "C:\Users\Admin\AppData\Local\Temp\1220.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2904

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2904-0-0x000007FEF5B83000-0x000007FEF5B84000-memory.dmp

          Filesize

          4KB

        • memory/2904-1-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

          Filesize

          56KB

        • memory/2904-2-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp

          Filesize

          9.9MB

        • memory/2904-3-0x000007FEF5B83000-0x000007FEF5B84000-memory.dmp

          Filesize

          4KB

        • memory/2904-4-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp

          Filesize

          9.9MB