Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 15:02
Behavioral task
behavioral1
Sample
cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe
Resource
win7-20240729-en
windows7-x64
6 signatures
120 seconds
General
-
Target
cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe
-
Size
72KB
-
MD5
ba18f7d0edaa499f6d0c29b952ab9380
-
SHA1
12d0f5f9a6e0a12ab3943fea5cb7999a2c66967e
-
SHA256
cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609d
-
SHA512
c6c340d148416036df4812408177286cc7aae87e85cc92e799fddc155adfea0961070283acfd57f03624d716df5685fad9d631d7ef503b6e9551dd681d05688f
-
SSDEEP
1536:TcJbKh5x/6104SBxlx428SSkbr/f6z0IE9zOJ7+Z:T/coBxlxlSkbru0V9zOJ7+Z
Malware Config
Extracted
Family
xworm
C2
newsletter-cave.gl.at.ply.gg:43237
Attributes
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4368-1-0x0000000000650000-0x0000000000668000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4368 cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe Token: SeDebugPrivilege 4368 cb17e8feb247eda1aa98d00049b52fc67aed6472ce98630e6d591bb01c65609dN.exe