Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 00:34
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
main.exe
-
Size
69KB
-
MD5
4822ba6a636e6004d529acd1c343d918
-
SHA1
6d3be23dbaf66ea561f4455bd7323cf9cd4c293d
-
SHA256
5506ccbd33408f09b67ca5f800e20acbe0bb895f42ef3234fe07b2ccff8d06ff
-
SHA512
9e018aa44dfc8f4a568e38530dc5b9893462afd9e0cfeb1fc40ff3ac512ed25ec86c50e59fe4d76d781e04195d7df36255a9e4dbc59cfdc940c4939985a173ee
-
SSDEEP
1536:s9RN41yg3LTU2a0AvR5bbT28ogW66QnBYOo+OyfX:4RN09LAvfbbC8olZpkOyfX
Malware Config
Extracted
Family
xworm
C2
173.31.160.10:4040
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2688-1-0x0000000000F80000-0x0000000000F98000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 main.exe