Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2024, 05:44
Behavioral task
behavioral1
Sample
scvhost (4).rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scvhost (4).rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
scvhost.exe
Resource
win7-20240708-en
General
-
Target
scvhost.exe
-
Size
41KB
-
MD5
42bfab585488af752295a07316ff9bab
-
SHA1
e967ee4fbbfe5216ed83d87c020e3e99b4e64dca
-
SHA256
5f75590c3453c7992f39be1ab37031397ad660a5ebe8ba399b3fb30a29f816c8
-
SHA512
0e44ad4d9a563a854fa2c6544a555b375b9604e4ba092987aa6f108fbc4ac57619fba99fdead3196c525ba12124907c6c151e01560e2ec159a57004ef5930623
-
SSDEEP
768:/mrJDweBDuOkScrbsN/x6WECAr43M4fJF5Pa9p+9b6iOwhc3/mbiQ:/0DwewicrbsN/YDRrcRF49I9b6iOwC+N
Malware Config
Extracted
xworm
5.0
38.156.214.168:4567
192.168.1.220:4567
buHNqt1P1TbTpE0p
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral4/memory/3404-1-0x0000000000EA0000-0x0000000000EB0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3404 scvhost.exe