Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 03:30
Behavioral task
behavioral1
Sample
a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe
-
Size
36KB
-
MD5
fccff79af62a4c34fdf4afb410fbaf86
-
SHA1
7fc71ef7fb4aa436b93ec4b6a825fee64501460f
-
SHA256
a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371
-
SHA512
16984aed999d32117a0afd9348b5bb12ee9abfec6a8ac2a4efdc494b93924048e42f145d1b8a99232f90d832aa22d4e6d9145aac3ff44e47648e1d5eef6e8d8e
-
SSDEEP
384:1HqouAgAkffHnjuNWoAgLWanS3FLZcWzWCX+280wpkFMAfNLT2OZwxcV2v99IkH6:VzuAinEWaRC4QFm9YkOMh1kGq
Malware Config
Extracted
Family
xworm
Version
5.0
Mutex
aq3Fac3Pq9GHgZuk
Attributes
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/juxAi7cy
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/5056-1-0x0000000000D00000-0x0000000000D10000-memory.dmp family_xworm -
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 pastebin.com 23 pastebin.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5056 a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5056 a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5056 a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe"C:\Users\Admin\AppData\Local\Temp\a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5056