Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 01:27
Behavioral task
behavioral1
Sample
fb2ee768ae02067262a54d8f7fcaa9e324b34fb0b4cfd30654f2a6dbf9eba734.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
fb2ee768ae02067262a54d8f7fcaa9e324b34fb0b4cfd30654f2a6dbf9eba734.exe
-
Size
35KB
-
MD5
4cbecdfccaa998bf29279114f567cdbb
-
SHA1
28ace987e94be008070ad2c4bcc82aacf516329b
-
SHA256
fb2ee768ae02067262a54d8f7fcaa9e324b34fb0b4cfd30654f2a6dbf9eba734
-
SHA512
88a59ee601835257a0c5caab38225280cd85193cb88a520f2d1f7e93d6bf926284f180af7266dcab6f9235d5e9db99584d6b100e44ea9f8bb2ff5688585cdc5f
-
SSDEEP
384:QqtdZi5eAKu6VztV/MH3uY2AU7LpCkjx5e5h/KwGkzaubf0nc/C7WX3yO5I2jz7w:Yy2BGpC4Len/KwG4vbZVdq22CJ9UhFMa
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%Temp%
-
install_file
Sistem X64.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1724-1-0x0000000000F70000-0x0000000000F80000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 fb2ee768ae02067262a54d8f7fcaa9e324b34fb0b4cfd30654f2a6dbf9eba734.exe