Analysis
-
max time kernel
92s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 03:48
Behavioral task
behavioral1
Sample
Checkers Service Tool.exe
Resource
win7-20240729-en
5 signatures
300 seconds
General
-
Target
Checkers Service Tool.exe
-
Size
43KB
-
MD5
595f112c449ff90a64c548e1844d9355
-
SHA1
67eaccfa243259973aa03f06a54207bd7b35454a
-
SHA256
c8b1cf8d89bf903a03596cd1a1489288b84a9c97c7cb186c4071b3eff1977fe9
-
SHA512
5d7c903c39b0837de538e8902e43012b99c17b9fd96a46e9c1a65e8e0a1f2be71dfe48e69a4f2cd663be4e1a3933a8ba31595a69a9458cea7f6943d28bf864fc
-
SSDEEP
768:I2fIy/d/FqPMFztaXChQ5ALY1icSg+F+79OwGF6BO+h5bVLIE:Jwy/I6zEysBi9Fk93GF6BO+vVd
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:8848
Mutex
CSjOQg4bXKD0FKHd
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3920-1-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3920 Checkers Service Tool.exe