Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 17:00
Behavioral task
behavioral1
Sample
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe
-
Size
70KB
-
MD5
3149ac1cd2f798f14c82e4eaa81b1853
-
SHA1
7939c17fc5433dcf060c2035bc035e5fefd33078
-
SHA256
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f
-
SHA512
c584204b5287b1c25fa33e7551504b19e60b89e05bbfe660146da9a1a937e32107f3eb95db5e63377308aa481d478b5e1ccf5c543b95317672328adbc685ad9a
-
SSDEEP
1536:1pOkU3DTMDMiAjp076sFiT/xXbC6gywEX3UUzGZDO2mvZRmD:1zUXMYd98QjxbC3I01O22SD
Malware Config
Extracted
Family
xworm
C2
win-britain.gl.at.ply.gg:55238
Attributes
-
Install_directory
%AppData%
-
install_file
testnt.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/216-1-0x0000000000AD0000-0x0000000000AE8000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe