Analysis

  • max time kernel
    299s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2025 12:42

General

  • Target

    WaveCrack_Setup.exe

  • Size

    40KB

  • MD5

    8287a8adc30dc0247fe326b7911915c1

  • SHA1

    86cb67ef4c3b5050388d55a52fc6c12eb719e5f2

  • SHA256

    4bcc85712b15132783ec43ba4f34f528f1a0dc9b3a62328fb15eefeebfb53820

  • SHA512

    4e8a3debc0bdb01ae1c93a0cb6840b0f19c2a84637d2624d680a638707ae96e89488539a342ca79e93bdfb1fb539a627c61c98aea0992659dfd2915d9129e565

  • SSDEEP

    384:5a1UqqyHfBXyhCTTTG/8VpPyJLZXHhamSPLZHI1t9lD4/PKANR2uiQHpkFMAIiLQ:NyMEvPE+1Z4ADNULNFr9eFqO+hn6px

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

sOB91tZbixBC7RKs

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/ay20NBKe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveCrack_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveCrack_Setup.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4080-1-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/4080-0-0x00007FFB308F3000-0x00007FFB308F5000-memory.dmp

    Filesize

    8KB

  • memory/4080-6-0x00007FFB308F0000-0x00007FFB313B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4080-7-0x00007FFB308F3000-0x00007FFB308F5000-memory.dmp

    Filesize

    8KB

  • memory/4080-8-0x00007FFB308F0000-0x00007FFB313B1000-memory.dmp

    Filesize

    10.8MB