Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 13:35
Behavioral task
behavioral1
Sample
asdasdasdasda.exe
Resource
win10v2004-20250217-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
asdasdasdasda.exe
Resource
win10ltsc2021-20250217-en
6 signatures
150 seconds
Behavioral task
behavioral3
Sample
asdasdasdasda.exe
Resource
win11-20250217-en
6 signatures
150 seconds
General
-
Target
asdasdasdasda.exe
-
Size
48KB
-
MD5
a60ecddeda18e71c641f0149c130cf21
-
SHA1
7a5763ef2685e13d74c92182fa6aa46fc9476064
-
SHA256
c33e509984c6cf412d6fe82792696e71dc30a467161eb3bdd457597cb8f61115
-
SHA512
8cdd2f5aaed5f8143f4e758cf8ad80ebef8963cbaf67b01c98b843426dfb9f37ae1d810a53d49b33b9d9f70df19389849d393e1d795d8471b64d8d79169d9d42
-
SSDEEP
768:q7wepLsTB5N5bXv4Gbql0Iv8B1tDPUeahJOLhG9X:q7bl2Bj1XAGbql0IUBYbOMB
Score
10/10
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/92.221.112.199:80
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3300-1-0x0000000000020000-0x0000000000032000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\asdasdasdasda = "C:\\Users\\Admin\\AppData\\Roaming\\asdasdasdasda.exe" asdasdasdasda.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 55 pastebin.com 45 pastebin.com 47 pastebin.com 53 pastebin.com 56 pastebin.com 59 pastebin.com 49 pastebin.com 57 pastebin.com 7 pastebin.com 46 pastebin.com 51 pastebin.com 52 pastebin.com 58 pastebin.com 60 pastebin.com 61 pastebin.com 6 pastebin.com 48 pastebin.com 50 pastebin.com 54 pastebin.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3300 asdasdasdasda.exe