Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 23:22
Behavioral task
behavioral1
Sample
498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.exe
-
Size
61KB
-
MD5
b64c4cd49519e33dea71f3ca70f6a60c
-
SHA1
13cba5ca7ffce442d6c1f713c5b22bf4b911f2cd
-
SHA256
498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8
-
SHA512
8e896693d9aee3d29fe9941cc62e0f697e2440033933f7cdf63ec980312b406f4b0861658e9a2c5137dd4092ddb31e559e35a68cd32c6ac03378a3a10e65cb90
-
SSDEEP
1536:PC1KA2hcrFua7uYHM5zZW52+ZbDoqjf3Npr83jXO8h1oOj:PC1KA2hcT7umMhZk2+ZbDFrv8zXO8hVj
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/728-1-0x00000000003F0000-0x0000000000406000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.lnk 498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.lnk 498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 38 IoCs
flow ioc 55 pastebin.com 80 pastebin.com 54 pastebin.com 32 pastebin.com 52 pastebin.com 53 pastebin.com 72 pastebin.com 75 pastebin.com 77 pastebin.com 81 pastebin.com 21 pastebin.com 28 pastebin.com 79 pastebin.com 20 pastebin.com 25 pastebin.com 62 pastebin.com 66 pastebin.com 67 pastebin.com 76 pastebin.com 78 pastebin.com 24 pastebin.com 33 pastebin.com 46 pastebin.com 60 pastebin.com 64 pastebin.com 68 pastebin.com 14 pastebin.com 61 pastebin.com 49 pastebin.com 31 pastebin.com 50 pastebin.com 56 pastebin.com 65 pastebin.com 82 pastebin.com 13 pastebin.com 51 pastebin.com 63 pastebin.com 48 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 728 498a7519cb7995809343cd6af68517c388973ac1b4b413c7851fc546258505e8.exe