Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
Compiler.exe
Resource
win7-20240903-en
General
-
Target
Compiler.exe
-
Size
84KB
-
MD5
106079faae035b4188595aa4aaa8b4d5
-
SHA1
e0b5ac10283087a478643caf09fc8d536f9ef0c0
-
SHA256
56b50264096dd509eefe770f619629b7ddfb45f8040c0e311670eba3235e46bf
-
SHA512
134a392c301a1f67130c39a74a2aadaaca505d6d2a984d56cf8cd64712add7b2877a54a379c195be08b5c5f4c94562a724519e5744cedd80ef3bc4db09a42694
-
SSDEEP
1536:jM3USZ+SBzXAsim+fLV7H2XeTlRsc2O1pU7RTafZycZO1783G6+euQ/Z:jiUyzXnoB7HueTlec1U7wfZyckOt+yZ
Malware Config
Extracted
xworm
3.1
197.48.109.181:8080
-
Install_directory
%AppData%
-
install_file
Disk Driver.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000d000000012276-6.dat family_xworm behavioral1/memory/1672-7-0x0000000000C10000-0x0000000000C28000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 1672 Compiler.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 Compiler.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 352 wrote to memory of 1672 352 Compiler.exe 30 PID 352 wrote to memory of 1672 352 Compiler.exe 30 PID 352 wrote to memory of 1672 352 Compiler.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Compiler.exe"C:\Users\Admin\AppData\Local\Temp\Compiler.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Roaming\Compiler.exe"C:\Users\Admin\AppData\Roaming\Compiler.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD56090b1b00079847b7ea648925901a706
SHA1f56b83da62fd8717acb74c133f93ed3f997d75cc
SHA256cd615e3c3897240f2fd4cff69a135627adff8cd4d20d135470c095ecd78921a4
SHA512307d90ded05df20f3aa310cf1c911b5b6cd8000c26e7d37010ff3e91092b1e21451baac4fa0469074c0a481d714fd96b8c142aa248f9f63d6bc2621abad2b77d