Analysis
-
max time kernel
42s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/03/2025, 19:09
General
-
Target
Project Jti.exe
-
Size
32KB
-
MD5
e18c2cd93f81b14a5ac8125510420c7b
-
SHA1
d78d0ec720163f40d6dd7bc522c55bf3432b4286
-
SHA256
8d9ae30bb7c7fd3223f66cfc8d2d8d846fb911b02d003b1f7ee2ea436749062e
-
SHA512
35a6bdf59ece87105205ee2f6ffa361b18e402991d259ee30fd8b509fb89f40b49d8c3c99cad0c66c3aff4e977a9cb308adce1203d67093d7869ace788fe0ab7
-
SSDEEP
768:pVa+vNtg+PB93Tw4xKdVFE9jTOjh3b1Y:BvNtgw93U4xcFE9jTOj5xY
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
Mutex
N2exJzPwtKFifSU8
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3092-1-0x0000000000A00000-0x0000000000A0E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3092 Project Jti.exe