Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 13:35
Behavioral task
behavioral1
Sample
asdasdasdasda.exe
Resource
win10v2004-20250217-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
asdasdasdasda.exe
Resource
win10ltsc2021-20250217-en
6 signatures
150 seconds
Behavioral task
behavioral3
Sample
asdasdasdasda.exe
Resource
win11-20250217-en
6 signatures
150 seconds
General
-
Target
asdasdasdasda.exe
-
Size
48KB
-
MD5
a60ecddeda18e71c641f0149c130cf21
-
SHA1
7a5763ef2685e13d74c92182fa6aa46fc9476064
-
SHA256
c33e509984c6cf412d6fe82792696e71dc30a467161eb3bdd457597cb8f61115
-
SHA512
8cdd2f5aaed5f8143f4e758cf8ad80ebef8963cbaf67b01c98b843426dfb9f37ae1d810a53d49b33b9d9f70df19389849d393e1d795d8471b64d8d79169d9d42
-
SSDEEP
768:q7wepLsTB5N5bXv4Gbql0Iv8B1tDPUeahJOLhG9X:q7bl2Bj1XAGbql0IUBYbOMB
Score
10/10
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/92.221.112.199:80
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral3/memory/1892-1-0x00000000004F0000-0x0000000000502000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000\Software\Microsoft\Windows\CurrentVersion\Run\asdasdasdasda = "C:\\Users\\Admin\\AppData\\Roaming\\asdasdasdasda.exe" asdasdasdasda.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 1 pastebin.com 6 pastebin.com 11 pastebin.com 19 pastebin.com 4 pastebin.com 5 pastebin.com 10 pastebin.com 13 pastebin.com 2 pastebin.com 8 pastebin.com 12 pastebin.com 14 pastebin.com 18 pastebin.com 20 pastebin.com 7 pastebin.com 9 pastebin.com 15 pastebin.com 16 pastebin.com 17 pastebin.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 asdasdasdasda.exe