Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 03:50
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
test.exe
-
Size
38KB
-
MD5
064adc1ac0842c1a8853c73cff06d1de
-
SHA1
ba39fd621bd15c85d7e126c3a8d1a82c528e40c1
-
SHA256
d5e04f673bbe88fe9592392cea03a3212f1f2204d12468126d11e63319422343
-
SHA512
32d721342056349bcb3203a5407d936eee2bf9a0c50ac271fbc19753bfd47cd2cde827d5de1c8c7bac88481911afd42890b47fabacd28e6dd7c43cb228934568
-
SSDEEP
768:zlhOEwjbrttFxUFNNixYD8YRRoNbTepFj9jae6SOMhULk/:zPybrwf2kRoNbTqFj9+e6SOMqY
Malware Config
Extracted
Family
xworm
Version
5.0
C2
java-either.gl.at.ply.gg:50133
Mutex
ajPUYvc7uZ6Tonau
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2760-1-0x0000000000020000-0x0000000000030000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 test.exe