Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 10:04

General

  • Target

    2024-11-16_b5c7c5a3e5cff5200f778c1cfe66fc16_hiddentear.exe

  • Size

    161KB

  • MD5

    b5c7c5a3e5cff5200f778c1cfe66fc16

  • SHA1

    3e5c09e83c6deb290f044967b41d5285eace4381

  • SHA256

    62d7cf6af843432a255464867fa9e06e9bc946c4c239940417f718b04ca7c3b7

  • SHA512

    2376854b9a1fb26a533b2a40deafdd070ee6218a358d7b398596211d62699b05412c9cf2b61dee0e0429c14e553ed77bdc638189b3936fcb3aaba51eb9dc2273

  • SSDEEP

    3072:7rgHyKp7h+b/A/OBHQM+lmsolAIrRuw+mqv9j1MWLQT:nyyKp7YbI0+lDAA

Score
10/10

Malware Config

Extracted

Family

xworm

C2

185.29.8.111:7000

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    client.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-16_b5c7c5a3e5cff5200f778c1cfe66fc16_hiddentear.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-16_b5c7c5a3e5cff5200f778c1cfe66fc16_hiddentear.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5092-0-0x00007FF976223000-0x00007FF976225000-memory.dmp

    Filesize

    8KB

  • memory/5092-1-0x00000000003B0000-0x00000000003DE000-memory.dmp

    Filesize

    184KB

  • memory/5092-6-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB

  • memory/5092-7-0x00007FF976223000-0x00007FF976225000-memory.dmp

    Filesize

    8KB

  • memory/5092-8-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB