Analysis
-
max time kernel
18s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 01:27
Behavioral task
behavioral1
Sample
2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
General
-
Target
2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe
-
Size
167KB
-
MD5
adb5151581740f8f5c0287b56a9f9386
-
SHA1
946b472681e9f1dd1237748cf6d3ad367d70f81d
-
SHA256
3b00e9d9a86f50aa50377f50575e2375ddc8a5c089e0d16c7683574e11159992
-
SHA512
01d8182b0ab6743acde4996c636856470d069ff89406d204f30506037f79cfa895e7787d68ac079c3269eea0747718d78349f66865d471e464410c2ea242f754
-
SSDEEP
3072:6l8vFnU4jkb9y37OOeKXM+lmsolAIrRuw+mqv9j1MWLQI:ic2bB+lDAA
Malware Config
Extracted
Family
xworm
C2
43.134.49.91:7921
127.2.253.25:7921
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2772-1-0x00000000011C0000-0x00000000011F0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe Token: SeDebugPrivilege 2772 2024-11-16_adb5151581740f8f5c0287b56a9f9386_hiddentear.exe