Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 22:29
Behavioral task
behavioral1
Sample
jhfkasdfhkjasdhfajkshfsahf.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
jhfkasdfhkjasdhfajkshfsahf.exe
-
Size
66KB
-
MD5
cf907ddedd3d0f6800e8e3bc704d7dc2
-
SHA1
e8cc5a7a80799a0688d09193650d1240d26d7c42
-
SHA256
79eda4e78316ec7d5cbc8fd3f66a74ee8f999bae82ce08ae48d937b9c9714614
-
SHA512
5e2f366733c0a9ec5b515b9948d339bfed54b7daec0acc544c7eb777457194abb4c7f3c4ee137a2a59d2817d7f9889a0d5b0b9d11d68da06a2ba3362654a9490
-
SSDEEP
1536:0rrkATgI8XkJpWR6QwGJbgZ4nCMzMLI6BeXfOzgw2:0HRTgXrRqobgZAzMjePOzf2
Malware Config
Extracted
Family
xworm
C2
45.88.91.55:7813
Attributes
-
Install_directory
%ProgramData%
-
install_file
steam-helper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/540-1-0x00000000008A0000-0x00000000008B6000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 540 jhfkasdfhkjasdhfajkshfsahf.exe