Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 04:10
Behavioral task
behavioral1
Sample
Tatashop.exe
Resource
win7-20241010-en
10 signatures
150 seconds
General
-
Target
Tatashop.exe
-
Size
32KB
-
MD5
b1f0cf268c89c3b4451fa8fb0de4425e
-
SHA1
bb82f62faabd3bc890d6e153834d4a5e1a43598c
-
SHA256
d608c65caef9766a1253aec412c65e4155c9cee370b5a90ca83300b97dc05e29
-
SHA512
a98c106ce6fe8baabca305bf2a69545eccd49f9719531b59251472ece28816c50a500ba0a2e46cd7aa1a8b8010be7fc805d68d02a4753e586820842472274f96
-
SSDEEP
768:mVa+vNtg+PB93Tw4eJdVFE9jnocOjh6bzd:IvNtgw93U4e9FE9jnZOjYN
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:1234
Mutex
LnpsNdDKOK2XQbyg
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4084-1-0x0000000000A70000-0x0000000000A7E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 Tatashop.exe