Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-09-2024 06:31
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
test.exe
Resource
win10v2004-20240802-en
General
-
Target
test.exe
-
Size
32KB
-
MD5
9ef813f8d17e2b07e3e22ca9136cfde3
-
SHA1
5b75837d1ec6b17af46ea657431424e876977b0b
-
SHA256
893847d848f3a7dad901866ad350530f91100d52c3db60fbefec8a9f33f1d472
-
SHA512
8862cd1cb967ccb66106f031ef37fc6dbc4a240101aa3782b66b5f5a0810e78dfc47eab8c5ce0c26e7acc637ecdf391b4f0ea6d4ec99411e4e5bf270aad083b6
-
SSDEEP
768:mRPD9OQhx/Bg3Tw4xKdVFE9jAVLFOjh1b2:md9OW/g3U4xcFE9jAVLFOjXK
Malware Config
Extracted
xworm
5.0
4.tcp.eu.ngrok.io:19050
FT7jVsIDwcsDC2pB
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral4/memory/2436-1-0x00000000004A0000-0x00000000004AE000-memory.dmp family_xworm -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 1 4.tcp.eu.ngrok.io -
Delays execution with timeout.exe 1 IoCs
pid Process 2080 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2436 test.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3300 2436 test.exe 80 PID 2436 wrote to memory of 3300 2436 test.exe 80 PID 3300 wrote to memory of 2080 3300 cmd.exe 82 PID 3300 wrote to memory of 2080 3300 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp755A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD59c5df57fde1edf692ce10e8cd2914df6
SHA17fef1cb2cfafc5e0368c31e6a8bc01de114e2430
SHA256cd2f4a0aa9923b3cdac21a248f5d974cabae32714d580f3de57363869dc16e9c
SHA51246a5e433b0f9add610b5676bcbb1990fb83bb05db3f4cd1d8c3db16674ef4d8d8da7bb57ba06d40ca0ed18a0c386828549d77c4ecef231ada729a3eaf01c20a5