Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 16:48
Behavioral task
behavioral1
Sample
2180-1-0x00000000002F0000-0x000000000075A000-memory.exe
Resource
win7-20240903-en
windows7-x64
0 signatures
150 seconds
General
-
Target
2180-1-0x00000000002F0000-0x000000000075A000-memory.exe
-
Size
4.4MB
-
MD5
5df7a3201da0da17e30ba3e59cd95a48
-
SHA1
d53433eca9121359d50180d92c68944d00dd56e6
-
SHA256
cbf8d272e5e3b70d90186e5cd47523afbd7fc2a20003928c90f23bdb761ffb29
-
SHA512
3958bf5c1a75f61e633451e6ccfb41cf636230ac3dea45408712e6414040684cd1cff306316d6592cadab95153bdf75551cd4fdcc9055b386222b8a9e60c2a67
-
SSDEEP
98304:+KoJ0hutMmvZiOJqzhdatyXJDn+ZoJVZUiMd7+FttcWOtojJ:+nZZ+dagXJr5TZUb+/yfqV
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:8938
Mutex
rrUYjJlOwwu2jjkk
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4140-1-0x00000000007E0000-0x0000000000C4A000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4140 2180-1-0x00000000002F0000-0x000000000075A000-memory.exe