Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 13:25
Behavioral task
behavioral1
Sample
2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe
-
Size
170KB
-
MD5
ae4957b9487d4bef4561924cacfd87e1
-
SHA1
7c4345be2315779d07e5b2caa5105f021aa71a98
-
SHA256
2bca82cd14951c2ce35707a176b1555956c8ef938187f4e7687da194c818b492
-
SHA512
5fcf65119c64066b8f5837d09680f1cb61f224ff17ce72ad54976730f126b9f63974f2549ce1c12044b42b06472c1a81f3d8abfe18d3be758156517de6930bc5
-
SSDEEP
3072:RUetQRGSwRzAkYQbv9bG6ApBaO24M+lmsolAIrRuw+mqv9j1MWLQz:RxCR2ZYQb1bXcO+lDAA
Malware Config
Extracted
Family
xworm
C2
185.29.8.111:7000
Attributes
-
Install_directory
%AppData%
-
install_file
svhosts.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2976-1-0x00000000001A0000-0x00000000001D0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhosts.lnk 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhosts.lnk 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2976 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2976 2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe"1⤵
- Drops startup file
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2976