Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 02:33

General

  • Target

    sextape.exe

  • Size

    66KB

  • MD5

    e7193cc5604f34faa83f73fc05b9c005

  • SHA1

    69da6d91173e30bafc8368a1c2135c09ec71a9be

  • SHA256

    1371009bc3d343a4a0ab6762113a0eee6a6b7b6ea39aa3cc4226144da0548427

  • SHA512

    c91904ce0897ddfe20bc0e7474b0630f1556337762c4c6d368d42f2946f98ceae4109c9f5b50566467270011b7f68cf4009085e9b2b746a8e0455fa408b69505

  • SSDEEP

    1536:7J5OnP2gbyDKJWF6C123bT+f1OOxHR3J:7J4PzbyNobaf1OOxHT

Score
10/10

Malware Config

Extracted

Family

xworm

C2

wednesday-knight.gl.at.ply.gg:48312

0xF488F3FA5541d79f0b1945ccA834cD6d939dD864:1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sextape.exe
    "C:\Users\Admin\AppData\Local\Temp\sextape.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x00007FFF5B653000-0x00007FFF5B655000-memory.dmp

    Filesize

    8KB

  • memory/2200-1-0x0000000000080000-0x0000000000096000-memory.dmp

    Filesize

    88KB

  • memory/2200-2-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-3-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB