Analysis
-
max time kernel
10s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe
Resource
win7-20241010-en
General
-
Target
2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe
-
Size
387KB
-
MD5
f65f2a9fdc2e61ef6fc2d37844949049
-
SHA1
a41e5e5970eac8bcc110261a81f047496caf1bc0
-
SHA256
d74da9974644408ec493ce12f2c05e6aa270c3e9b829e8434d2f0278f8f2ae3a
-
SHA512
71062b7b62bf0ff80d4795d4ab1427621d9831ad2a0526d95135f2f1e4b53b851c830fa51501664070df3845a04efc13c157d0ca67b04f71277af9f6cff3f882
-
SSDEEP
12288:Eh1Lk70Tnvjc7dAANmNmYnGqwz5XSBvv71:Ak70TrcxAhmWJwzZc3h
Malware Config
Signatures
-
Detect Xworm Payload 35 IoCs
resource yara_rule behavioral2/memory/2148-1-0x0000000002310000-0x0000000002362000-memory.dmp family_xworm behavioral2/memory/2148-5-0x0000000004A00000-0x0000000004A52000-memory.dmp family_xworm behavioral2/memory/2148-62-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-71-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-68-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-64-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-60-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-56-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-54-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-52-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-51-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-48-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-44-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-40-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-36-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-34-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-33-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-31-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-28-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-24-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-67-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-58-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-46-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-42-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-38-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-26-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-8-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-22-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-20-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-7-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-18-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-16-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-14-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-12-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm behavioral2/memory/2148-10-0x0000000004A00000-0x0000000004A4B000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2376 2148 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 18122⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2148 -ip 21481⤵PID:2796