Analysis

  • max time kernel
    44s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-01-2025 04:17

General

  • Target

    rat.exe

  • Size

    58KB

  • MD5

    6c11c2d8d820ec31234facdfefe3a68b

  • SHA1

    f1df0f86c9ff8724229ad285c36d7e68281a6e99

  • SHA256

    5aa8c33941fb6fa703a24071c9edf9b8e988e5ae1b6621e29546cd238bda3775

  • SHA512

    58d39a41a678d9024101a2b09375f510f5c312605673320564b46ed014a743abeba92095a78e80ad5c4ae4e7fc000a56e103e1db524dbdb3c3a3275435ab2f6e

  • SSDEEP

    1536:ghxJkDcumJYw2kgLzEyc7nz+byYhqapL4V7O2TWWc:ggw2dSz+byubUxO2T7c

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat.exe
    "C:\Users\Admin\AppData\Local\Temp\rat.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4308-0-0x00007FF8C0A13000-0x00007FF8C0A15000-memory.dmp

    Filesize

    8KB

  • memory/4308-1-0x0000000000A30000-0x0000000000A44000-memory.dmp

    Filesize

    80KB

  • memory/4308-2-0x00007FF8C0A10000-0x00007FF8C14D2000-memory.dmp

    Filesize

    10.8MB

  • memory/4308-3-0x00007FF8C0A13000-0x00007FF8C0A15000-memory.dmp

    Filesize

    8KB

  • memory/4308-4-0x00007FF8C0A10000-0x00007FF8C14D2000-memory.dmp

    Filesize

    10.8MB