Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
Fyz.exe
Resource
win7-20240903-en
General
-
Target
Fyz.exe
-
Size
83KB
-
MD5
f1f85fdacfd295faf64fb7a23973cd49
-
SHA1
ebdb5b3687670aa3f64fab82558f62b4190daf4f
-
SHA256
75ec0944508969faba292ea85974baa5880f95100280851592615d1befd24513
-
SHA512
3fdf6627a2758a77e6dd2f1164764491af4402a0463edf60dd7c6d436fc0484498226e2408770fbcf44fe72b1b1c0685957ab56a3083729bf5a5a9d1acb2deef
-
SSDEEP
1536:VgXeoVUIzfmssAhUykfv6QZslxxctjAHmSu0ADfI/e5VihgvsMnkJ:VgXFVUIzfmGULfv6ucx2E0TfoTQkJ
Malware Config
Extracted
xworm
172.16.150.134:5001
:5001
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ea-5.dat family_xworm behavioral1/memory/1696-8-0x00000000011E0000-0x00000000011F6000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 1696 Fyz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1696 Fyz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1696 2612 Fyz.exe 31 PID 2612 wrote to memory of 1696 2612 Fyz.exe 31 PID 2612 wrote to memory of 1696 2612 Fyz.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fyz.exe"C:\Users\Admin\AppData\Local\Temp\Fyz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\Fyz.exe"C:\Users\Admin\AppData\Roaming\Fyz.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD527a8edebacfd79bedc942888d9da2598
SHA10d7237622f3ee9f46d1c3ac468eef22257c88ca3
SHA25647cb072c103a1c0bfa3ed27dc29cc984c18abc7336af09ad08ea5b87583dca75
SHA51252c54c7eac0eb78b0ebdb74c8cc1fdc98f31198b5b51fb2d3d2c22dda79e7904b42cb3354c48a75ae5745a638d95539df7f96b4a8540ebef773761468c8ebcb6