Analysis

  • max time kernel
    95s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2024, 01:57

General

  • Target

    b59f8aa345438bdb58e6939f7d127cdcc44e1f9e907cf3bdf6aae86df39a93af.exe

  • Size

    481KB

  • MD5

    8c0001c9778f78612be047c759d5e75e

  • SHA1

    7772e9963eadb4d6063260dbb301f229c04e34f7

  • SHA256

    b59f8aa345438bdb58e6939f7d127cdcc44e1f9e907cf3bdf6aae86df39a93af

  • SHA512

    a36ef7475d9e723fdab42d91684d1ad868bbac6a4d528666f7ccb0c8dc819d4074e8ed34b47384b33072773c3a8bea89880de56362abc60a8eb37fd0da807325

  • SSDEEP

    12288:TRpwAsn4WQldetfqu0R9nTnFEVoQd8jc7Ke:dpwAsn47luq9jFivg

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

outside-probe.gl.at.ply.gg:15581

Mutex

IZyQaNq9K1TMZV9t

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family

Processes

  • C:\Users\Admin\AppData\Local\Temp\b59f8aa345438bdb58e6939f7d127cdcc44e1f9e907cf3bdf6aae86df39a93af.exe
    "C:\Users\Admin\AppData\Local\Temp\b59f8aa345438bdb58e6939f7d127cdcc44e1f9e907cf3bdf6aae86df39a93af.exe"
    1⤵
      PID:3196

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3196-0-0x00007FFB34915000-0x00007FFB34916000-memory.dmp

            Filesize

            4KB

          • memory/3196-1-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-3-0x000000001B9C0000-0x000000001BA66000-memory.dmp

            Filesize

            664KB

          • memory/3196-2-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-4-0x000000001BF60000-0x000000001C42E000-memory.dmp

            Filesize

            4.8MB

          • memory/3196-5-0x000000001C4D0000-0x000000001C56C000-memory.dmp

            Filesize

            624KB

          • memory/3196-7-0x000000001C570000-0x000000001C5BC000-memory.dmp

            Filesize

            304KB

          • memory/3196-6-0x0000000001030000-0x0000000001038000-memory.dmp

            Filesize

            32KB

          • memory/3196-8-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-9-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-10-0x00007FFB34915000-0x00007FFB34916000-memory.dmp

            Filesize

            4KB

          • memory/3196-11-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-12-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-13-0x000000001D520000-0x000000001D546000-memory.dmp

            Filesize

            152KB

          • memory/3196-14-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-15-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB

          • memory/3196-16-0x00007FFB34660000-0x00007FFB35001000-memory.dmp

            Filesize

            9.6MB