Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 04:40
Behavioral task
behavioral1
Sample
a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.exe
-
Size
61KB
-
MD5
3fe50cfec20210addc80f500e129def0
-
SHA1
722be146a7dc2801770f2865ecafee9c70192543
-
SHA256
a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8ee
-
SHA512
1856f153875397e873a84b9b0709c9ec332ff11094584c0b0ccc2616a0990975f3fe104a0cb3bdd6b9e60908e15d1205aa421dffd75a2e98eefc0f53f9a2d78a
-
SSDEEP
1536:PC1KA2hcrFua7uYHM5zZW52+ZbDoqjf3Npr83jXO8h1oO:PC1KA2hcT7umMhZk2+ZbDFrv8zXO8hV
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3532-1-0x0000000000940000-0x0000000000956000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.lnk a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.lnk a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 38 IoCs
flow ioc 50 pastebin.com 68 pastebin.com 75 pastebin.com 76 pastebin.com 19 pastebin.com 48 pastebin.com 54 pastebin.com 62 pastebin.com 73 pastebin.com 78 pastebin.com 21 pastebin.com 28 pastebin.com 39 pastebin.com 51 pastebin.com 60 pastebin.com 81 pastebin.com 27 pastebin.com 67 pastebin.com 69 pastebin.com 77 pastebin.com 29 pastebin.com 79 pastebin.com 20 pastebin.com 30 pastebin.com 61 pastebin.com 31 pastebin.com 49 pastebin.com 52 pastebin.com 74 pastebin.com 80 pastebin.com 15 pastebin.com 16 pastebin.com 46 pastebin.com 47 pastebin.com 53 pastebin.com 58 pastebin.com 59 pastebin.com 66 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3532 a3f2c1a4136cbf9ecc2b16f266c349796296b7300dc3f5d6f4d50fafe22cf8eeN.exe