Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 17:06

General

  • Target

    sextape.exe

  • Size

    66KB

  • MD5

    e7193cc5604f34faa83f73fc05b9c005

  • SHA1

    69da6d91173e30bafc8368a1c2135c09ec71a9be

  • SHA256

    1371009bc3d343a4a0ab6762113a0eee6a6b7b6ea39aa3cc4226144da0548427

  • SHA512

    c91904ce0897ddfe20bc0e7474b0630f1556337762c4c6d368d42f2946f98ceae4109c9f5b50566467270011b7f68cf4009085e9b2b746a8e0455fa408b69505

  • SSDEEP

    1536:7J5OnP2gbyDKJWF6C123bT+f1OOxHR3J:7J4PzbyNobaf1OOxHT

Score
10/10

Malware Config

Extracted

Family

xworm

C2

wednesday-knight.gl.at.ply.gg:48312

0xF488F3FA5541d79f0b1945ccA834cD6d939dD864:1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sextape.exe
    "C:\Users\Admin\AppData\Local\Temp\sextape.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2592

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2592-0-0x000007FEF5F13000-0x000007FEF5F14000-memory.dmp

    Filesize

    4KB

  • memory/2592-1-0x0000000000850000-0x0000000000866000-memory.dmp

    Filesize

    88KB

  • memory/2592-2-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2592-3-0x000007FEF5F13000-0x000007FEF5F14000-memory.dmp

    Filesize

    4KB

  • memory/2592-4-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

    Filesize

    9.9MB