Analysis

  • max time kernel
    115s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 22:12

General

  • Target

    e6cfabef69322a4578808665072e1db85e881736d686e64c229f1ea8d3435153.exe

  • Size

    38KB

  • MD5

    4ec8a668815c66a7b555f1290e26bd19

  • SHA1

    552be57ae2d287e494eabe00590a1e7ed9c9be5c

  • SHA256

    e6cfabef69322a4578808665072e1db85e881736d686e64c229f1ea8d3435153

  • SHA512

    8d4421a799f064cf1ec894f1900d3cb766fac9f031001b9785bb182813eb286b3000d7be90166d08e6416ff12de2d5ba36803b51a8f58c07413fcd92aa0a2445

  • SSDEEP

    768:/V7Kjkq9PMXOh5G7m9NFfZk7FWPB9WNOMh2aQkryy:/xq/oa5PFyFO9WNOM4syy

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

america-surrey.gl.at.ply.gg:54338

Mutex

uqf0RwmqN0bmwjTI

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6cfabef69322a4578808665072e1db85e881736d686e64c229f1ea8d3435153.exe
    "C:\Users\Admin\AppData\Local\Temp\e6cfabef69322a4578808665072e1db85e881736d686e64c229f1ea8d3435153.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4300-0-0x00007FFB69683000-0x00007FFB69685000-memory.dmp

    Filesize

    8KB

  • memory/4300-1-0x00000000000F0000-0x0000000000100000-memory.dmp

    Filesize

    64KB

  • memory/4300-6-0x00007FFB69680000-0x00007FFB6A141000-memory.dmp

    Filesize

    10.8MB

  • memory/4300-7-0x00007FFB69683000-0x00007FFB69685000-memory.dmp

    Filesize

    8KB

  • memory/4300-8-0x00007FFB69680000-0x00007FFB6A141000-memory.dmp

    Filesize

    10.8MB