Analysis
-
max time kernel
13s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 12:25
Behavioral task
behavioral1
Sample
5c090259f354cbe0d917da2471e4d6b3dd6ca5e8a05d31e77c290fdce0f50687N.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
120 seconds
General
-
Target
5c090259f354cbe0d917da2471e4d6b3dd6ca5e8a05d31e77c290fdce0f50687N.exe
-
Size
41KB
-
MD5
45fb906ecd6017f058532062b0675930
-
SHA1
fc7a78eca032dadc43d885856b9358ef3224905f
-
SHA256
5c090259f354cbe0d917da2471e4d6b3dd6ca5e8a05d31e77c290fdce0f50687
-
SHA512
ca14fb39458fb8f4a717acac352d49173596f548aa3e1da4adcecb4449fa7ff3a797cd675d45bd6496e7cea978538e3f55cf0def8beb46e774a31158e21d2619
-
SSDEEP
768:IhvGkOK5lJMU1BaeLCAr43M4fJF5Pa9p+CLq6iOwh1A3/mbL:IZzZ5lR14URrcRF49ICLq6iOwzw+P
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:51756
Mutex
iHSHx8XoJ3Dy1AbJ
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2172-1-0x0000000000E10000-0x0000000000E20000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 5c090259f354cbe0d917da2471e4d6b3dd6ca5e8a05d31e77c290fdce0f50687N.exe