Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 21:26
Behavioral task
behavioral1
Sample
bkcracker-privateV1.2.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
bkcracker-privateV1.2.exe
-
Size
79KB
-
MD5
47abba11eb5de0176dc2620268f973b9
-
SHA1
88c65fd19f6f158164e7052285cb08a3bc3b1577
-
SHA256
e9757cf90a5b034412b7f5cdd7211b3274d22f981fa0cace2a4a67e0e9ad0be8
-
SHA512
cd9772dfa31d7b4fa81bc32d6c18db84f50bad47a80b0ba1f9d328ee532e0a3b72a4fbbd1d3739e469d4566bcf32fe5188a1f7969076b883b46f74416a7869e7
-
SSDEEP
1536:uq9exgGaR2sY5RYM/+YfYFb9qosm3zqjL/Rcop8OczVrl6n2L9v0gjRh:uqnfvEGmUFb9guoiOexl3MMh
Malware Config
Extracted
Family
xworm
C2
10.0.0.97:7000
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2872-1-0x0000000000D20000-0x0000000000D3A000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 bkcracker-privateV1.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bkcracker-privateV1.2.exe"C:\Users\Admin\AppData\Local\Temp\bkcracker-privateV1.2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2796
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Downloads\PopMerge.cmd" "1⤵PID:2832