Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 22:26
Behavioral task
behavioral1
Sample
2025-03-04_6803215592fd9cd6ffb299385dc44b8e_hiddentear.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
2025-03-04_6803215592fd9cd6ffb299385dc44b8e_hiddentear.exe
-
Size
151KB
-
MD5
6803215592fd9cd6ffb299385dc44b8e
-
SHA1
9bdb0356393386162063ea6f9cd5f72b51119264
-
SHA256
04c75c092c9f64493318740487b08858644373a3b9f4c549f9cd2b25ea60d548
-
SHA512
c46ec6fea4781072d80c383757da4475c2a983c411c61bfb784b64c294bfafaa343b8176b22697666c3c1fa7d4c01a074cf163c9c4f30b3ff0b8e03c435e9b2b
-
SSDEEP
3072:exNg5f/SLXkbvhPOpCM+lmsolAIrRuw+mqv9j1MWLQA:eQyUbK+lDAA
Malware Config
Extracted
Family
xworm
C2
135.148.125.190:46613
Attributes
-
Install_directory
%Temp%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2656-1-0x0000000000210000-0x000000000023C000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 2025-03-04_6803215592fd9cd6ffb299385dc44b8e_hiddentear.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 2025-03-04_6803215592fd9cd6ffb299385dc44b8e_hiddentear.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 2025-03-04_6803215592fd9cd6ffb299385dc44b8e_hiddentear.exe