Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 21:42
Behavioral task
behavioral1
Sample
bk-fixed.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
bk-fixed.exe
-
Size
76KB
-
MD5
9ba96801ef7763ec2cd3511780cd20b3
-
SHA1
22225abd3ae38fbe758d549e574ceeda962e1e7c
-
SHA256
46eb679dd45be1e09f1b0aaf6bbcff714808fed5c561b55214f962b664d4b925
-
SHA512
12a0d54879740ea84ed1965dfd54042b9f1c1c3ea7acf458500c5ee44b674d950bc338c40b4bad1b22c45154f88b066bebb4fb32439f77a4e246b444b943158e
-
SSDEEP
1536:fo3l2Rja/FuPlY932zcmncWZHAucvAlbgMF3WLc4gGiQOVkM95cT4gSR3:fwiAmnLFcvgbgMF0OVV5Z3
Malware Config
Extracted
Family
xworm
C2
10.0.0.97:7000
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2336-1-0x0000000001210000-0x000000000122A000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2336 bk-fixed.exe