Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 08:18
Behavioral task
behavioral1
Sample
0852070946c994c917dc120520af8bb0c482c583ee46c7f97af0d7d0b5cb879fN.exe
Resource
win7-20240903-en
General
-
Target
0852070946c994c917dc120520af8bb0c482c583ee46c7f97af0d7d0b5cb879fN.exe
-
Size
142KB
-
MD5
264c15ac721a2f333c487e4f10cf5dd6
-
SHA1
b7b452dd8e88dc47572061b563f33c05b6d8acbc
-
SHA256
72236b0c3065f7c3d5fdb92c12360ba861da775d04575a0dd2e24c49cfc72903
-
SHA512
0c3f91e80a019ecd55d9dbf820fd38d61b640a8e4f0d5ee0e5b2a076f788c8ca4aa1194a5c444d9cb22d528355911263815708cceceeb0e3872fa0fdb7799f4b
-
SSDEEP
768:EG2ZOWZ42nxujIXvgggCLJF5PG9pm9X6vOwh03Emzk621sIwEk4w00wIF:EG2bZ42n0UXvvgcFI9Ah6vOwO9HEUF
Malware Config
Extracted
xworm
5.0
rather-obtain.gl.at.ply.gg:41839
H1dYqdAbVrDWBJtu
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3056-1-0x0000000000050000-0x0000000000078000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 0852070946c994c917dc120520af8bb0c482c583ee46c7f97af0d7d0b5cb879fN.exe