Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 16:11
Behavioral task
behavioral1
Sample
7z2409-x64.exe
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
7z2409-x64.exe
-
Size
34KB
-
MD5
cf509ae8f5102ea33a349dcc623cdb2a
-
SHA1
b81700b0e2136f9c316ec23ea3ba28d51866b5fc
-
SHA256
4e2871db941aef0dfe4aedb45114a61edc6a0cb5e607bc09872937c4b8917824
-
SHA512
5d704b7c02caebb02ed84e6bd2a7aceed514a9ec8a405f7497e8dbe78f46747d0fea641f63563ec0e34b1c1c278c111b48621b4a3265690326092cfe8ee5af98
-
SSDEEP
768:f6GQNLLzDVJx3Tw4BF7VFE9jXOjhbba3:iGQNLLzDx3U4BfFE9jXOjdG3
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:4782
172.26.96.1:4782
172.26.96.1:4782:4782
192.168.106.76:4782:4782
Mutex
35cOwAnUtrrvM56x
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2648-1-0x00000000001E0000-0x00000000001EE000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 7z2409-x64.exe