Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 11:29

General

  • Target

    decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe

  • Size

    80KB

  • MD5

    38167adb796f74a8ccbfda11c7db9758

  • SHA1

    26f3e32b69708912e91f34b3fbfd0bbf55902772

  • SHA256

    609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc

  • SHA512

    6832a17b628334b4680b66f919d51249a0831399e78a7fbb4f584fdba067d50107e43b6de551262e7affd3ee79dea554865ce48596bdbddaefde493a902f4e14

  • SSDEEP

    768:ZDb0I+a4DL7zg2Kd3yG92RlFWDb0I+a4DL7zg2Kd3yG92RlF:ZPoECV3FWPoECV3F

Score
10/10

Malware Config

Extracted

Family

xworm

C2

xworm1120.duckdns.org:1120

Mutex

D0iCsL6PUuq7iVxc

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family

Processes

  • C:\Users\Admin\AppData\Local\Temp\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe
    "C:\Users\Admin\AppData\Local\Temp\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe"
    1⤵
      PID:1712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-0-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

      Filesize

      4KB

    • memory/1712-1-0x0000000000C00000-0x0000000000C10000-memory.dmp

      Filesize

      64KB

    • memory/1712-2-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

      Filesize

      9.9MB

    • memory/1712-3-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

      Filesize

      4KB

    • memory/1712-4-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

      Filesize

      9.9MB