Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 01:37

General

  • Target

    2025-03-03_86292f6606d16cc6394419de61e9956e_hiddentear.exe

  • Size

    170KB

  • MD5

    86292f6606d16cc6394419de61e9956e

  • SHA1

    52de556ddc1d22c8e88b162956b2bc5709059914

  • SHA256

    ed1019bacf6c2435ed5fd7cd0a51b58170ae25665de79505ab188b673b2a55df

  • SHA512

    7c7f8c155b4dcb58ec5a0ee189d30bd26696cc7771e9deaa2d044fd323278a5f63b70c58e2e72edea9b09cecdc35c2820b91ddd73fba9a78eaba30212255692e

  • SSDEEP

    3072:jWDpZm+7MTji+Y9bZjMDzOlWM+lmsolAIrRuw+mqv9j1MWLQo:jW3MitbmQ+lDAA

Score
10/10

Malware Config

Extracted

Family

xworm

C2

198.23.200.96:5353

Attributes
  • Install_directory

    %AppData%

  • install_file

    krypto.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-03_86292f6606d16cc6394419de61e9956e_hiddentear.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-03_86292f6606d16cc6394419de61e9956e_hiddentear.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2608-0-0x00007FFBA1EA3000-0x00007FFBA1EA5000-memory.dmp

    Filesize

    8KB

  • memory/2608-1-0x0000000000700000-0x0000000000730000-memory.dmp

    Filesize

    192KB

  • memory/2608-6-0x00007FFBA1EA0000-0x00007FFBA2961000-memory.dmp

    Filesize

    10.8MB

  • memory/2608-7-0x00007FFBA1EA3000-0x00007FFBA1EA5000-memory.dmp

    Filesize

    8KB

  • memory/2608-8-0x00007FFBA1EA0000-0x00007FFBA2961000-memory.dmp

    Filesize

    10.8MB