Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 01:50

General

  • Target

    fud crypto/fudcrypto.exe

  • Size

    212KB

  • MD5

    eea17ac368bc01f9f8a3e0103cf5b6e6

  • SHA1

    d4df74f888d9025497c9e4b418c65cfa2c0ab2c0

  • SHA256

    de1d872fa35b4ec1a843db9c63fc7e4590fd3b7b250ab5c6a492630ab68b5886

  • SHA512

    cf297ea8ec540354a22fd046d34f6fc93e74bfe474e4729531263180e4cb35af48c0b6614f5a88c72f0bf767890109eba13c8eca3c9f1f6abaffe7cacabaaccf

  • SSDEEP

    3072:Fm18FOY1Y10lDPANA8nL8U0TaxzKJltDM7t7aAwA9u7m0Vuth4R1:cEDoTnL8hDY7JPCVu0

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.234.114.133:1188

Mutex

cbhMMjEG3bxpp43T

Attributes
  • Install_directory

    %Temp%

  • install_file

    system.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fud crypto\fudcrypto.exe
    "C:\Users\Admin\AppData\Local\Temp\fud crypto\fudcrypto.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\651.exe
      C:\Users\Admin\AppData\Local\Temp\651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:4692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\651.exe

    Filesize

    33KB

    MD5

    bc59447ed6636ac09fbf5faa235e0d67

    SHA1

    6bc2eda63514866023bf55330153267fc764c88a

    SHA256

    bec57b2da35fec182afc1eeaf45132aac46da538ea746c7f2c41fd3369677b49

    SHA512

    9baa8e9a7c59bec41b6a7fa035644fe95a33fa694cc77ecb272de7c532ede869d0ec7c987c1ad35cc2f4dde92dd22d9edb65ccce0e471334768be305b0a11d1e

  • memory/1628-0-0x00007FFB68625000-0x00007FFB68626000-memory.dmp

    Filesize

    4KB

  • memory/1628-1-0x000000001BDE0000-0x000000001BE86000-memory.dmp

    Filesize

    664KB

  • memory/1628-2-0x00007FFB68370000-0x00007FFB68D11000-memory.dmp

    Filesize

    9.6MB

  • memory/1628-3-0x00007FFB68370000-0x00007FFB68D11000-memory.dmp

    Filesize

    9.6MB

  • memory/1628-12-0x00007FFB68370000-0x00007FFB68D11000-memory.dmp

    Filesize

    9.6MB

  • memory/4692-8-0x00007FFB664A3000-0x00007FFB664A5000-memory.dmp

    Filesize

    8KB

  • memory/4692-9-0x0000000000EB0000-0x0000000000EBE000-memory.dmp

    Filesize

    56KB

  • memory/4692-13-0x00007FFB664A0000-0x00007FFB66F61000-memory.dmp

    Filesize

    10.8MB

  • memory/4692-14-0x00007FFB664A0000-0x00007FFB66F61000-memory.dmp

    Filesize

    10.8MB