Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:06
Behavioral task
behavioral1
Sample
173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe
Resource
win7-20240903-en
General
-
Target
173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe
-
Size
35KB
-
MD5
9e8c98f74babd7b8a9c2d84d07c5b140
-
SHA1
ee67b43ddd03000158045436cc9688a4e102b35f
-
SHA256
20355236f71216ff0468146e40060d1ca6d9d468ecd7c33049e98efa0756a267
-
SHA512
d5035dc484279df58b8dc3e525f2bafc67207ab713f38cb29b284c65a33601a1aa40d104427fbd3e6b957d6473b530a058ae7d805c9a2bc120f942a72bab843c
-
SSDEEP
384:ygg9j00WbqxAMTayV5N+5maFZZL3CQpJm3/KNm0ob0VgtFMAmNLToZw/RZCvK9Iz:kB4QBTOl3CF3CNCVFQ9ioeOMhUkl7
Malware Config
Extracted
xworm
3.1
jameshde18.duckdns.org:8895
W2eicRNCy3K0SdYM
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/648-1-0x0000000000DE0000-0x0000000000DF0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.lnk 173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.lnk 173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 648 173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 648 173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 648 173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\173088030786a18a2794c9cc92c8eac138d6c7ff0ac9709a4bfbbf3602d096be735a3d90b9656.dat-decoded.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:648