Analysis

  • max time kernel
    94s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 20:03

General

  • Target

    Checkers Service Tool.exe

  • Size

    43KB

  • MD5

    f0b96a06a91f4a2c227915b023a03ad8

  • SHA1

    e9aa8e953d55c0dc9c45597da2b59e7961e962fa

  • SHA256

    20764846e89dceec8ea2ca4711e0566b3345f946949037df154c8d67f723a5df

  • SHA512

    75f9de32cb50cb27528412cfc356455d82eb41a9dd0788d52e059e0b6afc33a33a42ae9341bc24eaadcaab675c5fac888ebf52e51095f825a67384d879fdc786

  • SSDEEP

    768:iIysL9yYzLx1gwrDxKTq9L11pxyN+F+s9OJxH6BO+hYbVLlThop:itAyA91gwr97xTFr9GxH6BO+2Vjop

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8848

Mutex

xdi7mlIIsJa9O7Ut

Attributes
  • Install_directory

    %AppData%

  • install_file

    Checkers Service Tool.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Checkers Service Tool.exe
    "C:\Users\Admin\AppData\Local\Temp\Checkers Service Tool.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4596-0-0x00007FFBFC993000-0x00007FFBFC995000-memory.dmp

    Filesize

    8KB

  • memory/4596-1-0x0000000000120000-0x0000000000132000-memory.dmp

    Filesize

    72KB

  • memory/4596-2-0x00007FFBFC990000-0x00007FFBFD451000-memory.dmp

    Filesize

    10.8MB

  • memory/4596-3-0x00007FFBFC990000-0x00007FFBFD451000-memory.dmp

    Filesize

    10.8MB