Analysis
-
max time kernel
1961s -
max time network
2601s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 09:54
General
-
Target
Virus Scanner.exe
-
Size
64KB
-
MD5
0732513db7c9e6b21adca80d4d2f8364
-
SHA1
525862b4a012cd877f54f11d945890073be934bb
-
SHA256
c8afad096280ca4bef31282beebeab04f507f23ff934fb7cef7c84f6f60617a0
-
SHA512
d1b40cc102294d9d8736b2fc0ce8b52c88de85b589b18e12f57623c3308adad63e3a14015fe6a77e60106994024a8d3f6a1907fb6f9071328651ef82199356e0
-
SSDEEP
1536:tpXBGDECUAHG4YWhV/0bw18cswbVqp+s6hOR1HJM:tpRgUruew10wbVVOR1u
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:54179
all-virtual.gl.at.ply.gg:54179
Attributes
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2080-1-0x0000000000920000-0x0000000000936000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 Virus Scanner.exe