Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-01-2025 01:04
Behavioral task
behavioral1
Sample
Update.exe
Resource
win10ltsc2021-20250113-en
10 signatures
150 seconds
General
-
Target
Update.exe
-
Size
61KB
-
MD5
6afe04684a757675a359e7152592e644
-
SHA1
d436a89ed573a6f5cb5d9b5f5d971cc12ac09e7b
-
SHA256
734583184759ee71d9a25e037f25e409f2f1c7adfd1927bf6838bbfb62f2195e
-
SHA512
25d29d6ceb7d2aaf57d689dba5bad64268151cad17d989b34dadb5146a10f6e15e9a424c927a453d2cdc0e78e0561c348d78e98c1250fc590420ad21b3bed94a
-
SSDEEP
1536:wmtWxjhNJeaJXi+btWeYpive5scO3yKWRC6:wPjhNwaJXi+bw3EqhO3yKWU6
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:18889
147.185.221.25:18889
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4948-1-0x0000000000560000-0x0000000000576000-memory.dmp family_xworm -
Xworm family
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4948 Update.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4948 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4948 Update.exe