Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 03:47
Behavioral task
behavioral1
Sample
FNExternal.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
FNExternal.exe
-
Size
86KB
-
MD5
7dc43a52c140117ec3a23b8f78496f0f
-
SHA1
1c7c2697d12df0398fcb089853a1b5789f3ae887
-
SHA256
820d57a6faa4134e63df8bba8638792b55a7fe3c77559812706cd7de4da189b6
-
SHA512
95898e739ead059e06531367a0c5ca5c630ed1f16a2a2c36cada8b7a94d4fe81f7486ab7ef720da1ae09169c08fc32aa64fb4a5554a5779095400582bcaaf3be
-
SSDEEP
1536:N20YwopvrUvr0wMTwjqWJZiCbJVjWTDpJO960azDAOuymZp+X:BYZpAvgwMm5iCbJCSO5mZ8X
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:37044
design-ears.gl.at.ply.gg:37044
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1956-1-0x0000000000390000-0x00000000003AC000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 FNExternal.exe