Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 01:46

General

  • Target

    fudcrypto.zip

  • Size

    212KB

  • MD5

    8989cf7b833dc53bafc8ec626c3c13d8

  • SHA1

    f5bbc5d9eb758a286de576bfb7b08e79d0bd7acb

  • SHA256

    d074441c881b5ba2b3f238a730edbb942b0dfb97114e1a06ebd4872282a654ef

  • SHA512

    7b373981cf06727207b8177aced9f989270a94635737cc6dbc27c041a3db5559df17987342bcc3d1d3ae8e2770065e27d9eb2c2eb3f92b30f8890a933b03da1e

  • SSDEEP

    6144:B7/IelIkZgzD3ysBmPXjifL7JPkVu0iGty:S6LgzD3oXk7FYJty

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.234.114.133:1188

Mutex

cbhMMjEG3bxpp43T

Attributes
  • Install_directory

    %Temp%

  • install_file

    system.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\fudcrypto.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1544
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4368
    • C:\Users\Admin\Desktop\fud crypto\fudcrypto.exe
      "C:\Users\Admin\Desktop\fud crypto\fudcrypto.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Local\Temp\595.exe
        C:\Users\Admin\AppData\Local\Temp\595.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\595.exe

      Filesize

      33KB

      MD5

      bc59447ed6636ac09fbf5faa235e0d67

      SHA1

      6bc2eda63514866023bf55330153267fc764c88a

      SHA256

      bec57b2da35fec182afc1eeaf45132aac46da538ea746c7f2c41fd3369677b49

      SHA512

      9baa8e9a7c59bec41b6a7fa035644fe95a33fa694cc77ecb272de7c532ede869d0ec7c987c1ad35cc2f4dde92dd22d9edb65ccce0e471334768be305b0a11d1e

    • C:\Users\Admin\Desktop\fud crypto\fudcrypto.exe

      Filesize

      212KB

      MD5

      eea17ac368bc01f9f8a3e0103cf5b6e6

      SHA1

      d4df74f888d9025497c9e4b418c65cfa2c0ab2c0

      SHA256

      de1d872fa35b4ec1a843db9c63fc7e4590fd3b7b250ab5c6a492630ab68b5886

      SHA512

      cf297ea8ec540354a22fd046d34f6fc93e74bfe474e4729531263180e4cb35af48c0b6614f5a88c72f0bf767890109eba13c8eca3c9f1f6abaffe7cacabaaccf

    • memory/2564-22-0x0000000000190000-0x000000000019E000-memory.dmp

      Filesize

      56KB

    • memory/4288-14-0x00007FFE2C355000-0x00007FFE2C356000-memory.dmp

      Filesize

      4KB

    • memory/4288-15-0x000000001B290000-0x000000001B336000-memory.dmp

      Filesize

      664KB

    • memory/4288-16-0x00007FFE2C0A0000-0x00007FFE2CA41000-memory.dmp

      Filesize

      9.6MB

    • memory/4288-17-0x00007FFE2C0A0000-0x00007FFE2CA41000-memory.dmp

      Filesize

      9.6MB

    • memory/4288-25-0x00007FFE2C0A0000-0x00007FFE2CA41000-memory.dmp

      Filesize

      9.6MB