General
-
Target
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9.doc
-
Size
424KB
-
Sample
241202-jzm24sslbr
-
MD5
44970a65ef51dafee89eb8c1c5258d80
-
SHA1
6fbc5973d72f7141aeed349675e7679aa83a23b6
-
SHA256
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9
-
SHA512
3fa8c428845dd5fbd32024900e65a331372f115bd04af8deca53facd2d2837664133973a25a877f7ecf20333c0792567ce1616815ae7d73019140786f4f53b98
-
SSDEEP
12288:dJ3PY3Q3lQ32AbgBUVv6QMwdV1yRLC8U3tZ:dpbCmtPQzGRLeZ
Static task
static1
Behavioral task
behavioral1
Sample
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9.docx
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
185.244.29.113:5563
-
Install_directory
%AppData%
-
install_file
xwor.exe
Targets
-
-
Target
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9.doc
-
Size
424KB
-
MD5
44970a65ef51dafee89eb8c1c5258d80
-
SHA1
6fbc5973d72f7141aeed349675e7679aa83a23b6
-
SHA256
21d66da2e2506afa8d351e3ce34d1f9a4de6d8305168c0c302987710d83a12b9
-
SHA512
3fa8c428845dd5fbd32024900e65a331372f115bd04af8deca53facd2d2837664133973a25a877f7ecf20333c0792567ce1616815ae7d73019140786f4f53b98
-
SSDEEP
12288:dJ3PY3Q3lQ32AbgBUVv6QMwdV1yRLC8U3tZ:dpbCmtPQzGRLeZ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1