Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 09:48
Behavioral task
behavioral1
Sample
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe
-
Size
79KB
-
MD5
6a38c40e75c6a8bf59c27f075ae8fe50
-
SHA1
dea1a6673aba42fff5091f1098530db6378b4843
-
SHA256
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7
-
SHA512
1740a10610ec5327089ea2a14e4750253a4059803ec7545432d63189a8cf31b2d6ec8ae8a4f6db5ae3070f1cdfc5c5eb05cdd65c8687f522f5f96244a1839c0d
-
SSDEEP
1536:j+GS0wR8+ABXjq7g3vcsHdfC7sbvYwugpeziN601wdB50OcvQVDdUq:j+F0wmxjqkfP1PbvYseijoB50Ocs6q
Malware Config
Extracted
Family
xworm
C2
where-reverse.gl.at.ply.gg:9999
Attributes
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3008-1-0x00000000000C0000-0x00000000000DA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe