Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 09:26
Behavioral task
behavioral1
Sample
ea26fecd6d406f242195aa68c32523218b84041cfdcba9314c1aee64e69ee3b8.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
ea26fecd6d406f242195aa68c32523218b84041cfdcba9314c1aee64e69ee3b8.exe
-
Size
153KB
-
MD5
3504d735153aa02cda0e6b3078df6687
-
SHA1
41a02a1dcbde06fba943882cf27bb96bbeda55ef
-
SHA256
ea26fecd6d406f242195aa68c32523218b84041cfdcba9314c1aee64e69ee3b8
-
SHA512
eba2480ff971e981ee4940abc05ac1050e95fac2a9113c729aee26b93b94c89b8e486b900d840e025fd6dde5143fb560b4b7516a8a4fa17073e1177b7aedb810
-
SSDEEP
3072:OmjALFQ9I8OMP4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvJ:OMSQ9rgVqwlL
Malware Config
Extracted
Family
xworm
Version
5.0
C2
192.168.10.24:7222
Mutex
3HJeLIc1VbxbCESq
Attributes
-
Install_directory
%AppData%
-
install_file
x-manager.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4752-1-0x0000000000080000-0x00000000000AC000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4752 ea26fecd6d406f242195aa68c32523218b84041cfdcba9314c1aee64e69ee3b8.exe