Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2024, 01:17
Behavioral task
behavioral1
Sample
fix.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
fix.exe
-
Size
40KB
-
MD5
b959b8c3505c2e17d3d944ba48d285f8
-
SHA1
0155afd2d2a57d3070a900bbb405145977300b7c
-
SHA256
ea8cd343d704a76b3f3dc8ffacdcfefb56f2d7571a68b42381146d91a9bb5526
-
SHA512
4fdef5114503fd8be5cfd64e945994dcde399239f0c03873a6cd48b2e7a030b99fb755e23f6dfc185274eb4f6712dee0d1ffc68b11d148e701819ebf576d6c47
-
SSDEEP
768:OFrGIhUKXBeFQOnHAvrSH7tF5Pa9qB9Owh43/mXZ:OueBehHAv6xF49qB9Owu+XZ
Malware Config
Extracted
Family
xworm
Version
5.0
C2
behind-h.gl.at.ply.gg:44133
Mutex
B9kO57FG9eew8BnL
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4504-1-0x00000000003A0000-0x00000000003B0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4504 fix.exe