Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
Resource
win10v2004-20241007-en
General
-
Target
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe
-
Size
450KB
-
MD5
78371fec766abeea44a21976d2c45dbd
-
SHA1
894148a87d832de1621d51ce0f19d88fa50d067c
-
SHA256
75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804
-
SHA512
1aca30e1317573c7dd34fb9fd62ab174d022ac5f425450c740f2eabe00cc339f5a5dfcb10b492116fdb99d8e8b3f40ac733004c08b9aa41930ba478e421e5572
-
SSDEEP
6144:WKcaBvV8VqQIX6p1YNFWYZinXFWUnA0RRrZKg9oNBWdCblnUN+KTMnFri:WnQv+b1YSFdg9iQwG+
Malware Config
Extracted
xworm
5.0
104.234.114.133:1188
KDTXz0km6agBYGv2
-
Install_directory
%AppData%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1168-2-0x0000000002C40000-0x0000000002C4E000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Roaming\\system.exe" 75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 75a551d009cab61896d99174e5bd0e8fa1918f25a5f8e8dfc012ecff29bd1804.exe