Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 13:25

General

  • Target

    2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe

  • Size

    170KB

  • MD5

    ae4957b9487d4bef4561924cacfd87e1

  • SHA1

    7c4345be2315779d07e5b2caa5105f021aa71a98

  • SHA256

    2bca82cd14951c2ce35707a176b1555956c8ef938187f4e7687da194c818b492

  • SHA512

    5fcf65119c64066b8f5837d09680f1cb61f224ff17ce72ad54976730f126b9f63974f2549ce1c12044b42b06472c1a81f3d8abfe18d3be758156517de6930bc5

  • SSDEEP

    3072:RUetQRGSwRzAkYQbv9bG6ApBaO24M+lmsolAIrRuw+mqv9j1MWLQz:RxCR2ZYQb1bXcO+lDAA

Score
10/10

Malware Config

Extracted

Family

xworm

C2

185.29.8.111:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    svhosts.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-15_ae4957b9487d4bef4561924cacfd87e1_hiddentear.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3376-0-0x00007FFB93F43000-0x00007FFB93F45000-memory.dmp

    Filesize

    8KB

  • memory/3376-1-0x0000000000150000-0x0000000000180000-memory.dmp

    Filesize

    192KB

  • memory/3376-6-0x00007FFB93F40000-0x00007FFB94A01000-memory.dmp

    Filesize

    10.8MB

  • memory/3376-7-0x00007FFB93F43000-0x00007FFB93F45000-memory.dmp

    Filesize

    8KB

  • memory/3376-8-0x00007FFB93F40000-0x00007FFB94A01000-memory.dmp

    Filesize

    10.8MB