Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
Resource
win10v2004-20241007-en
General
-
Target
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
-
Size
450KB
-
MD5
78371fec766abeea44a21976d2c45dbd
-
SHA1
894148a87d832de1621d51ce0f19d88fa50d067c
-
SHA256
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804
-
SHA512
1aca30e1317573c7dd34fb9fd62ab174d022ac5f425450c740f2eabe00cc339f5a5dfcb10b492116fdb99d8e8b3f40ac733004c08b9aa41930ba478e421e5572
-
SSDEEP
6144:WKcaBvV8VqQIX6p1YNFWYZinXFWUnA0RRrZKg9oNBWdCblnUN+KTMnFri:WnQv+b1YSFdg9iQwG+
Malware Config
Extracted
xworm
5.0
104.234.114.133:1188
KDTXz0km6agBYGv2
-
Install_directory
%AppData%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2272-3-0x0000000000370000-0x000000000037E000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Roaming\\system.exe" 75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe