Analysis
-
max time kernel
1791s -
max time network
1155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-11-2024 03:58
General
-
Target
XClient.exe
-
Size
60KB
-
MD5
6b6253c21c975a0b6107183db0351a16
-
SHA1
82bdb167fbba0d4fbbc13b6c07d1597fd15814e6
-
SHA256
53086a7a04cc6fdc1ee66d4190786228de502c4d8a5216ea02edb3c580d216a2
-
SHA512
d080b6da28fa625ecfcaf0773740ff4e4cfa50d8194b22439db3730aab3e1ad9ab9f35eaca10b498bb437f62950d4e51d55c67597d39d59a9ef97eeda827ef56
-
SSDEEP
768:duCZn4/H4enwnVyrRYeY80ARjPYGOqaWNkbDiTy+X+Tw0HveY8E/OZh4hot9:wdhkkYyaGkbDiTuw3L0OZai9
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4516-1-0x0000000000AD0000-0x0000000000AE6000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4516 XClient.exe