Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 21:44
Behavioral task
behavioral1
Sample
sct.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
sct.exe
-
Size
30KB
-
MD5
720070608efb9768e2afb6f7f59980fe
-
SHA1
43550ecca0bd9530201e64ba322a81e21d94cee7
-
SHA256
52d430b79b4aebae803e805ff4154e79a3ea5b040387b6981fbe02a210481b5e
-
SHA512
e3f95411a7472819224cfa0f6f1c325023d077e76bc7c03ac5fd7f3f7cee1facc2a92005e714e7287c4456405455a1d8b91a100823d56817022cd2a7b2f49749
-
SSDEEP
768:Zecbl/b3AMYAoReJ2uBFE9RAEkOqhtbz:AcxNJ24FE9RA7OqzP
Malware Config
Extracted
Family
xworm
Version
3.1
C2
147.185.221.23:14947
Mutex
xhwEAi0tjKka4wPR
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2856-1-0x0000000001380000-0x000000000138E000-memory.dmp family_xworm -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 sct.exe