Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 21:26
Behavioral task
behavioral1
Sample
bkcracker-privateV1.2.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
bkcracker-privateV1.2.exe
-
Size
79KB
-
MD5
47abba11eb5de0176dc2620268f973b9
-
SHA1
88c65fd19f6f158164e7052285cb08a3bc3b1577
-
SHA256
e9757cf90a5b034412b7f5cdd7211b3274d22f981fa0cace2a4a67e0e9ad0be8
-
SHA512
cd9772dfa31d7b4fa81bc32d6c18db84f50bad47a80b0ba1f9d328ee532e0a3b72a4fbbd1d3739e469d4566bcf32fe5188a1f7969076b883b46f74416a7869e7
-
SSDEEP
1536:uq9exgGaR2sY5RYM/+YfYFb9qosm3zqjL/Rcop8OczVrl6n2L9v0gjRh:uqnfvEGmUFb9guoiOexl3MMh
Malware Config
Extracted
Family
xworm
C2
10.0.0.97:7000
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3460-1-0x0000000000DD0000-0x0000000000DEA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3460 bkcracker-privateV1.2.exe