Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 17:16

General

  • Target

    .exe

  • Size

    40KB

  • MD5

    2d83ffb1a05be44cad752f38417c9dd2

  • SHA1

    f00654018773b78eaa63945963fa458b6770b923

  • SHA256

    ea51932b361cef7f72f9215bfe0643893034d012e8a7175a052c670766375891

  • SHA512

    c76aac50b3d9ddb80e558269c6045ce1e25646cd934d4a9aece6079fac486f5cb57ddf02458f4163287ba9d9f0ce1bcbf4173a98276a771855e676e56d5849ca

  • SSDEEP

    768:TERUFPu4riNqCwWzkSRs0RpPw9XsQhLO4uekM:Ta40NdPwp1ObekM

Score
10/10

Malware Config

Extracted

Family

xworm

C2

employment-audience.gl.at.ply.gg:18358:1111

Mutex

zazrSXbaPKZmoJfB

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\.exe
    "C:\Users\Admin\AppData\Local\Temp\.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4180-0-0x00007FFEF0D73000-0x00007FFEF0D75000-memory.dmp

    Filesize

    8KB

  • memory/4180-1-0x00000000000A0000-0x00000000000B0000-memory.dmp

    Filesize

    64KB

  • memory/4180-2-0x00007FFEF0D70000-0x00007FFEF1831000-memory.dmp

    Filesize

    10.8MB

  • memory/4180-3-0x00007FFEF0D73000-0x00007FFEF0D75000-memory.dmp

    Filesize

    8KB

  • memory/4180-4-0x00007FFEF0D70000-0x00007FFEF1831000-memory.dmp

    Filesize

    10.8MB