Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 00:04
Behavioral task
behavioral1
Sample
XWorm_V5.6.rar
Resource
win7-20240903-en
windows7-x64
16 signatures
150 seconds
Behavioral task
behavioral2
Sample
XWorm_V5.6.rar
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
XWorm_V5.6.rar
-
Size
22.7MB
-
MD5
7cc04f4750fbcc52368b58baca67c915
-
SHA1
c3d2935b4ecfb9caa86bfbc7a3b0082a34edf447
-
SHA256
f056b8a8aa21ea9fda55f3437fdbc493a0c9b5f341cc92f53e0ef962d4811315
-
SHA512
c92e8dd1ad87cf92915444239bf5b3041a0753be6c34a6291761d4ac875965514b9e460b27b0a0835980bffa807bbb5e3eaaaaad57417cbd890259afc8ccf23c
-
SSDEEP
393216:phBT2GKhaSl9luSkfZseOatwwKMMTdBxgs1ZLqU95n2+bGsj10vdrP9aTqf:12pkalDeBKMMTZJH9t2ej0V9a+
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4540 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4540 7zFM.exe Token: 35 4540 7zFM.exe Token: SeSecurityPrivilege 4540 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4540 7zFM.exe 4540 7zFM.exe 4540 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm_V5.6.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4540
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4500