Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 03:11
Behavioral task
behavioral1
Sample
quiet..cc.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
quiet..cc.exe
-
Size
37KB
-
MD5
a991b1676045ce69bbf429d7ac44221b
-
SHA1
f8927df404f8c4ea8f3d63546aea72122fe600fc
-
SHA256
c013408e97d08ae9fecc6b62fd7fd3d23322ef6b21aeca2dcc6deb8219246c3f
-
SHA512
5affdb2296662e80138f18175143819a7e9a1be39a9e53e5166a29d00e4a226d32f8426b8498e4cb82c7d767d299bdb3f1549351b6474798dd7cfefb44f60995
-
SSDEEP
768:Q5jjKW/XWIeKmxz3AXFyK9Oiq6YOjhgPy8VX:Q5P9XWIG7uF397q6YOjubX
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:37010
countries-allowed.gl.at.ply.gg:37010
called-stainless.gl.at.ply.gg::37010
called-stainless.gl.at.ply.gg:37010
Mutex
FM43L4JzgLoyB9NE
Attributes
-
Install_directory
%ProgramData%
-
install_file
RobloxPlayerBeta.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2484-1-0x00000000009C0000-0x00000000009D0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 quiet..cc.exe