Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 13:49

General

  • Target

    92445f7d84d93ee3be494d74cb3b85e59b5c887ab192dba6aa61624745c10536N.exe

  • Size

    185KB

  • MD5

    8d1477d4dffe9420fdcbc4bd97a67b20

  • SHA1

    ac8243f05e8bcf4e0418f32d18acc7d387ed1602

  • SHA256

    92445f7d84d93ee3be494d74cb3b85e59b5c887ab192dba6aa61624745c10536

  • SHA512

    8589b7e7e2065464485943cf967ec9157a8bc80142f53f05d7f9ab1b5649ecd40cba402899fbf2bd9f67c54684c85bfa97acbb1a054d9dc845b1bf23c8989cb4

  • SSDEEP

    3072:3AZO54CsHLN07b5yZ3/hUr2a+O61ZpFRtqGXBz65/M6If+3Js+3JFkKeTnW:3ofHq7bmPhVtqGXxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92445f7d84d93ee3be494d74cb3b85e59b5c887ab192dba6aa61624745c10536N.exe
    "C:\Users\Admin\AppData\Local\Temp\92445f7d84d93ee3be494d74cb3b85e59b5c887ab192dba6aa61624745c10536N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2328-0-0x000007FEF6003000-0x000007FEF6004000-memory.dmp

    Filesize

    4KB

  • memory/2328-1-0x00000000011E0000-0x0000000001214000-memory.dmp

    Filesize

    208KB

  • memory/2328-2-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2328-3-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

    Filesize

    9.9MB