Analysis
-
max time kernel
52s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-11-2024 18:29
Behavioral task
behavioral1
Sample
SolaraV3.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
6 signatures
150 seconds
General
-
Target
SolaraV3.exe
-
Size
34KB
-
MD5
7c5de7e27718249128aac31f4e3362ea
-
SHA1
657e27b260171842d7104fd0af778530bea3f8c0
-
SHA256
c735c657b913747ba41f2b11498e8c0e138cbcd852c52540e17cda2a1ca8ea52
-
SHA512
2ca4275c1ee6c91b1014629f8f4b8bf7db048680b5e72e529ec537d2d4b21eb43418d7ff7626fa07164c2eb88186d169fb3ed90d839146edc87980f224dedccd
-
SSDEEP
384:6DxAXmqVlxOli1rJ2tK6mnRGwnBLmiOHCwvHixdTEgVR8pkFTBLTIZwYGDcvw9I1:OAXT2ts9tAHC4C7V9FZ9j2Ojh0/cI
Malware Config
Extracted
Family
xworm
Version
5.0
C2
item-encouraged.gl.at.ply.gg:57138
Mutex
Ek9apHcn9Fw5RFO7
Attributes
-
Install_directory
%AppData%
-
install_file
WindowsDefender.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3460-1-0x0000000000600000-0x000000000060E000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsDefender.lnk SolaraV3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsDefender.lnk SolaraV3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3460 SolaraV3.exe