Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2024, 04:15

General

  • Target

    f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe

  • Size

    47KB

  • MD5

    68ead50c6780f8cfcd34fc1c3d9d998a

  • SHA1

    071b72b8496fa68983cb77b319de6c93d1c7929a

  • SHA256

    f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752

  • SHA512

    9b08430d93ee0296e338d3f59b0a57c13a4f0faf2b1f4d10f6cc602843569d130dcaeb3929dce21ce00cf13b6ffb9b7de42bc3ac177fd6f029545240e2c4464c

  • SSDEEP

    768:aBoVSTAPW9jllp0XMtd70hq30gzbGYxIXDZVpNf3SOwht7a1ehVY:eHL9jldFwszbGYuTpIOwL0EY

Malware Config

Extracted

Family

xworm

Version

3.0

C2

16.ip.gl.ply.gg:41909

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b66de58a074f12a5e25b27f868701071124e088415c7ba44f81b41aa57f752.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4712-0-0x00007FF982043000-0x00007FF982045000-memory.dmp

    Filesize

    8KB

  • memory/4712-1-0x00000000007A0000-0x00000000007B2000-memory.dmp

    Filesize

    72KB

  • memory/4712-3-0x00007FF982040000-0x00007FF982B01000-memory.dmp

    Filesize

    10.8MB

  • memory/4712-4-0x00007FF982040000-0x00007FF982B01000-memory.dmp

    Filesize

    10.8MB