Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 17:16
Behavioral task
behavioral1
Sample
.exe
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
.exe
-
Size
40KB
-
MD5
2d83ffb1a05be44cad752f38417c9dd2
-
SHA1
f00654018773b78eaa63945963fa458b6770b923
-
SHA256
ea51932b361cef7f72f9215bfe0643893034d012e8a7175a052c670766375891
-
SHA512
c76aac50b3d9ddb80e558269c6045ce1e25646cd934d4a9aece6079fac486f5cb57ddf02458f4163287ba9d9f0ce1bcbf4173a98276a771855e676e56d5849ca
-
SSDEEP
768:TERUFPu4riNqCwWzkSRs0RpPw9XsQhLO4uekM:Ta40NdPwp1ObekM
Malware Config
Extracted
Family
xworm
C2
employment-audience.gl.at.ply.gg:18358:1111
Mutex
zazrSXbaPKZmoJfB
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4180-1-0x00000000000A0000-0x00000000000B0000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4180 .exe