Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 14:19
Behavioral task
behavioral1
Sample
SVrB5SO0.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
SVrB5SO0.exe
-
Size
32KB
-
MD5
766ec54768d9a6585b9625e9eb0f39d6
-
SHA1
1d9b5076691755124f7dcd4def42ff47e8a6115f
-
SHA256
47f6c041939b3b1139818fb26079fac7acd2261a827d53b62c6b4331aeee1c6c
-
SHA512
e8732685d166425afc6973c445e33c9bbf2eced82b40bba1303e959facd4da8538b2c7a26c46b8df312dcbeefaa4f102e1741ac122b71074bc8c3e3f3a04ec38
-
SSDEEP
384:Kr8WqVDweYXS3ghk3wcD6LxoZiYnM2M4dm5vR+ptFFBLTiZw/W+UvK9Ikn1WxOje:oiedxoZdnM2M4otcFz9LWOjhH/1v5E
Malware Config
Extracted
Family
xworm
C2
bedo5634.ddns.net:4444
Mutex
322a11LvLiAjzdEX
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3952-1-0x0000000000E50000-0x0000000000E5E000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SVrB5SO0.lnk SVrB5SO0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SVrB5SO0.lnk SVrB5SO0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3952 SVrB5SO0.exe