Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 04:24
Behavioral task
behavioral1
Sample
codesx.exe
Resource
win7-20241023-en
5 signatures
150 seconds
General
-
Target
codesx.exe
-
Size
37KB
-
MD5
79b494893a0dd0dc3458036441fc4379
-
SHA1
32f0d0309c701b4d1ab9c38acef0f76323045f2e
-
SHA256
1faa745bc17621a1737162a75939d995536bb9e62079290fc145b11a84ccc6ee
-
SHA512
e468afc12d23485fa22a44e9a8141f968f1a55651b880baa6e88b403e5e178cfc29c351deecce39ade0e36840304ec131307f160d2c1c5214c43a95ab2a65584
-
SSDEEP
768:xyMg0j1p2gKp72zsAZ5rskx3XFyG9OeEV6dOjhGDQa:xyMjU7LAZ5rsk1FT9Lg6dOjy
Malware Config
Extracted
Family
xworm
Version
5.0
C2
paul-nw.gl.at.ply.gg:51413
Mutex
BCSKD4uWCq2LzN8k
Attributes
-
Install_directory
%AppData%
-
install_file
kev.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1668-1-0x0000000000750000-0x0000000000760000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 codesx.exe