Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 11:29

General

  • Target

    decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe

  • Size

    80KB

  • MD5

    38167adb796f74a8ccbfda11c7db9758

  • SHA1

    26f3e32b69708912e91f34b3fbfd0bbf55902772

  • SHA256

    609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc

  • SHA512

    6832a17b628334b4680b66f919d51249a0831399e78a7fbb4f584fdba067d50107e43b6de551262e7affd3ee79dea554865ce48596bdbddaefde493a902f4e14

  • SSDEEP

    768:ZDb0I+a4DL7zg2Kd3yG92RlFWDb0I+a4DL7zg2Kd3yG92RlF:ZPoECV3FWPoECV3F

Score
10/10

Malware Config

Extracted

Family

xworm

C2

xworm1120.duckdns.org:1120

Mutex

D0iCsL6PUuq7iVxc

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family

Processes

  • C:\Users\Admin\AppData\Local\Temp\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe
    "C:\Users\Admin\AppData\Local\Temp\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe"
    1⤵
      PID:740

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/740-0-0x00007FFBBDA03000-0x00007FFBBDA05000-memory.dmp

      Filesize

      8KB

    • memory/740-1-0x0000000000AF0000-0x0000000000B00000-memory.dmp

      Filesize

      64KB

    • memory/740-2-0x00007FFBBDA00000-0x00007FFBBE4C1000-memory.dmp

      Filesize

      10.8MB

    • memory/740-3-0x00007FFBBDA03000-0x00007FFBBDA05000-memory.dmp

      Filesize

      8KB

    • memory/740-4-0x00007FFBBDA00000-0x00007FFBBE4C1000-memory.dmp

      Filesize

      10.8MB