Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:53
Behavioral task
behavioral1
Sample
72eeb9f45b7dcea8a74c09c4fedbf33035a0f08a7a5cb29e77126282910b1bac.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
72eeb9f45b7dcea8a74c09c4fedbf33035a0f08a7a5cb29e77126282910b1bac.exe
-
Size
77KB
-
MD5
bcc2eebd525ffdfaca1c9111cf24a51a
-
SHA1
e283bf81337d8da50b1009a03a3892acb320aa24
-
SHA256
72eeb9f45b7dcea8a74c09c4fedbf33035a0f08a7a5cb29e77126282910b1bac
-
SHA512
da2cf7da7e0254822264a72c19c3f826e256ae1ba310e7ca5535f60969700d78e8bab82c5752ed1ee4d9be27557a6da401b4c0b03c52dc36c777d6ced0f6b4c2
-
SSDEEP
1536:42QPqiSHd3R7Eyprx81TSPpboJ4sJtozn6+ZOWGE5RvfPNk:RiWhEk8hSboJ451ZObEvFk
Malware Config
Extracted
Family
xworm
C2
lists-start.gl.at.ply.gg:7000
Attributes
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2260-1-0x0000000000EB0000-0x0000000000ECA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 72eeb9f45b7dcea8a74c09c4fedbf33035a0f08a7a5cb29e77126282910b1bac.exe