Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 17:47

General

  • Target

    bfdc5c21c63377c8cdcf45538bf67c072f238f43d26d70c032988cf53e73e202.exe

  • Size

    33KB

  • MD5

    ec88c6775e02aa43155ae71081c94322

  • SHA1

    348cca6e9052caec7d158cb146681887634609fc

  • SHA256

    bfdc5c21c63377c8cdcf45538bf67c072f238f43d26d70c032988cf53e73e202

  • SHA512

    699f9983fbae4ab3716d01963a89bf8596b550c6635e4d0a49bef2c6d0dac959f5e33bc6e6afad20bcf6011b1ec7489ece85744b5b539e69e93a5d3ad85749de

  • SSDEEP

    384:Q10UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99Ikuis3v:EoD9vQB3Z3HJvlOPVF89j6OjhgbZr

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.1.133:4444

Mutex

s0UHVr0N3tbml9QZ

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfdc5c21c63377c8cdcf45538bf67c072f238f43d26d70c032988cf53e73e202.exe
    "C:\Users\Admin\AppData\Local\Temp\bfdc5c21c63377c8cdcf45538bf67c072f238f43d26d70c032988cf53e73e202.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1056-0-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

    Filesize

    4KB

  • memory/1056-1-0x00000000010E0000-0x00000000010EE000-memory.dmp

    Filesize

    56KB

  • memory/1056-2-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/1056-3-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

    Filesize

    4KB

  • memory/1056-4-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

    Filesize

    9.9MB