Analysis
-
max time kernel
116s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 09:13
Behavioral task
behavioral1
Sample
a1161c25429c7286424908e98d339ab22f627c2462452b8513e893b69c73528f.exe
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
a1161c25429c7286424908e98d339ab22f627c2462452b8513e893b69c73528f.exe
-
Size
59KB
-
MD5
9f0d0c4b6d6c380b4dc7606e6d29b01c
-
SHA1
6ba90d9f1e528a603fa0fd5cb761e25210056c09
-
SHA256
a1161c25429c7286424908e98d339ab22f627c2462452b8513e893b69c73528f
-
SHA512
1184ac8c8802e0b4d553827ec5a304a2920cedf0028ed3805bad3380dcbe9e316423d61326260cd57ff782f3e702ee97e059c03b3ddf0bf4c0e79290dcba1998
-
SSDEEP
1536:GYdzPAcTtnU2kqL2okb1cR5ovB+NNJGgqO89ogOe:GYFddU2kqTkb1juqzO89o/e
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:8888
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2580-1-0x0000000000EF0000-0x0000000000F06000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2580 a1161c25429c7286424908e98d339ab22f627c2462452b8513e893b69c73528f.exe