Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 11:44
Behavioral task
behavioral1
Sample
74ad850a826557d15f97d1a6d25ed6b95d131f246480e82b287f4d8f42f9ab63.exe
Resource
win7-20240903-en
General
-
Target
74ad850a826557d15f97d1a6d25ed6b95d131f246480e82b287f4d8f42f9ab63.exe
-
Size
64KB
-
MD5
5f9abf5fdc7ea0787b7d0028a54a674a
-
SHA1
76993b04e468129450d5107f04b42d1a08cf9e54
-
SHA256
74ad850a826557d15f97d1a6d25ed6b95d131f246480e82b287f4d8f42f9ab63
-
SHA512
1a12c64bfd57b083b377aa0f1f5a8f4cd28a1c6e96009f5aaa5a3a29e6161c5017a846a2c3e87480324631c892dfa0f92264182ff65612231334bb358aed0247
-
SSDEEP
1536:KdoJ9PiMgbgEk5f3QHdsH6hOrbZ+DX/qLH6ghJ8D1owz5Oh/7:M5U19sdsahOrbZeSEDaw1Oh/7
Malware Config
Extracted
xworm
3.0
-
Install_directory
%Temp%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/aN42btSy
-
telegram
https://api.telegram.org/bot6705170780:AAFLOXrnAOxDhNu3tap1IE119Otvgco_CbY/sendMessage?chat_id=6084847021
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1076-1-0x00000000001A0000-0x00000000001B6000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 74ad850a826557d15f97d1a6d25ed6b95d131f246480e82b287f4d8f42f9ab63.exe