Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 10:23
Behavioral task
behavioral1
Sample
W1FREE.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
W1FREE.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
W1FREE.exe
Resource
win10v2004-20241007-en
General
-
Target
W1FREE.exe
-
Size
67KB
-
MD5
6f7cabf4b4354595f267d7d0860a7264
-
SHA1
3743b4d0f283254216471af3d7a48febe1ea3d22
-
SHA256
ef18dab7131e795b252462e96eee632dcde3eacd98e4b58078eb82c74f5bd2a4
-
SHA512
39cc260160567a730656087c76b01ce28fa493b748344bd8215cceeca8863b89fd8fb0f3f2dc5c647dd0c531048b41744e7117ca985fdfaf96b2b609ba55455b
-
SSDEEP
1536:wxvEVs0WIyYR9hYoQtzJbI0UB+E32zUfOTwDnzRQ:wx8VTy+h/YlbV5oOEDFQ
Malware Config
Extracted
xworm
choose-throw.gl.at.ply.gg:13217
-
Install_directory
%AppData%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3036-1-0x00000000010A0000-0x00000000010B8000-memory.dmp family_xworm -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 W1FREE.exe