Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 06:30
Behavioral task
behavioral1
Sample
2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe
-
Size
159KB
-
MD5
9f2ccdbcfb9a53709920a15646c8d27e
-
SHA1
c05370d958b7295f5d6fbf4fddf5f7ef09947b3f
-
SHA256
894e865f66294aa2a31d8dd15d121675b3c9ca81a3676d210d4c4d48bcd7ed2e
-
SHA512
259406a8769d28595d196bb6cf0f7af1d0c492b2434106a2dee4ae15aec35f06b1c8d6e86bbe2638c0c8709858ab31a186029029228999cfe5dcaa0bf73d41e1
-
SSDEEP
3072:IX0khNDDU+bSqwO/aiM+lmsolAIrRuw+mqv9j1MWLQB:IpJFbPU+lDAA
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1420-1-0x0000000000FB0000-0x0000000000FDE000-memory.dmp family_xworm -
Xworm family
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1420 2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1420 2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe Token: SeDebugPrivilege 1420 2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-17_9f2ccdbcfb9a53709920a15646c8d27e_hiddentear.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1420