Analysis

  • max time kernel
    19s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 20:12

General

  • Target

    CheckersServiceTool.exe

  • Size

    43KB

  • MD5

    f0b96a06a91f4a2c227915b023a03ad8

  • SHA1

    e9aa8e953d55c0dc9c45597da2b59e7961e962fa

  • SHA256

    20764846e89dceec8ea2ca4711e0566b3345f946949037df154c8d67f723a5df

  • SHA512

    75f9de32cb50cb27528412cfc356455d82eb41a9dd0788d52e059e0b6afc33a33a42ae9341bc24eaadcaab675c5fac888ebf52e51095f825a67384d879fdc786

  • SSDEEP

    768:iIysL9yYzLx1gwrDxKTq9L11pxyN+F+s9OJxH6BO+hYbVLlThop:itAyA91gwr97xTFr9GxH6BO+2Vjop

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8848

Mutex

xdi7mlIIsJa9O7Ut

Attributes
  • Install_directory

    %AppData%

  • install_file

    Checkers Service Tool.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheckersServiceTool.exe
    "C:\Users\Admin\AppData\Local\Temp\CheckersServiceTool.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2596-0-0x000007FEF5B13000-0x000007FEF5B14000-memory.dmp

    Filesize

    4KB

  • memory/2596-1-0x00000000012E0000-0x00000000012F2000-memory.dmp

    Filesize

    72KB

  • memory/2596-2-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-3-0x000007FEF5B13000-0x000007FEF5B14000-memory.dmp

    Filesize

    4KB

  • memory/2596-4-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-5-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

    Filesize

    9.9MB