Analysis
-
max time kernel
30s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:12
Behavioral task
behavioral1
Sample
msedge.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msedge.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
msedge.exe
Resource
win10v2004-20240802-en
General
-
Target
msedge.exe
-
Size
105KB
-
MD5
7f63dba75cea8115a65daf651e73cbe4
-
SHA1
c9c7238f490b7d9a3b370500741be79291d93918
-
SHA256
393167c6887f41f1ab7339dbe1f0fedbefc0084a12c5b81c1050f21303db2c89
-
SHA512
4c9bc83c6bc10c910d1ce8b1d4cba97112e253f047d35a1453ac6880c2069adce82a5324407d18d2b6566c84f0364a1dd78211e054f1ebe98c10d1e7178854c8
-
SSDEEP
1536:DJRDFdGbFh9q06EOjf4GZjzQwK5WW7VCn6Ky7FAmu3wtBUniymeq07sZPSTlkOz/:DTFdUFh9qKOjJe5BV0WUniyimyg
Malware Config
Extracted
xworm
3.1
86.99.228.173:2
arJKoM4DP47o9wF9
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral3/memory/3684-1-0x0000000000F30000-0x0000000000F4E000-memory.dmp family_xworm -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3684 msedge.exe