Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 04:15

General

  • Target

    f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe

  • Size

    47KB

  • MD5

    68ead50c6780f8cfcd34fc1c3d9d998a

  • SHA1

    071b72b8496fa68983cb77b319de6c93d1c7929a

  • SHA256

    f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752

  • SHA512

    9b08430d93ee0296e338d3f59b0a57c13a4f0faf2b1f4d10f6cc602843569d130dcaeb3929dce21ce00cf13b6ffb9b7de42bc3ac177fd6f029545240e2c4464c

  • SSDEEP

    768:aBoVSTAPW9jllp0XMtd70hq30gzbGYxIXDZVpNf3SOwht7a1ehVY:eHL9jldFwszbGYuTpIOwL0EY

Malware Config

Extracted

Family

xworm

Version

3.0

C2

16.ip.gl.ply.gg:41909

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-0-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

    Filesize

    4KB

  • memory/1504-1-0x0000000000130000-0x0000000000142000-memory.dmp

    Filesize

    72KB

  • memory/1504-3-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

    Filesize

    9.9MB

  • memory/1504-4-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

    Filesize

    4KB

  • memory/1504-5-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

    Filesize

    9.9MB