Analysis
-
max time kernel
17s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 13:48
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/XWorm-5.6-main/Xworm V5.6.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/XWorm-5.6-main/Xworm V5.6.exe
Resource
win10v2004-20241007-en
General
-
Target
XWorm-5.6-main.zip
-
Size
24.8MB
-
MD5
98af17dc86622b292d58fbba45d51309
-
SHA1
44a7d9423ce00ddda8000f9d18e3fe5693b5776f
-
SHA256
eed75f0edf37bdd0d0a64ac8723672dbfe64288fb3845b89cc3596d0511f67d1
-
SHA512
b3b9c67e373bcba5bd039088953400a3296b374f29f5de00f56c0702da7f9eccf0c452586d486c17ab1ea5ab16240112fda8457ec258d2ba9735b17959db4b05
-
SSDEEP
786432:3vngbHGYI0DuXXEDgfI+tjIdubuu0SVww6vZqwffr:fgbHGY2hfI8yuxV7oswXr
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 1744 7zFM.exe Token: 35 1744 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 1744 7zFM.exe