Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 02:13
Behavioral task
behavioral1
Sample
VMXModMenu.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
VMXModMenu.exe
-
Size
101KB
-
MD5
b2ed14da26475b542695dfeb44683e6b
-
SHA1
36fdcf814f1ab5ce4b563c9de97fe16c0c015dfc
-
SHA256
b9533e27109f91d578d381dc1997cc9301f5f8e5625c83b6430182a61e38ece1
-
SHA512
e7a5892ab83a8c9540073575f39d7f968996d7c5e93b7ae2421a9be7ea10a40ca719fabc4532b8bc065c71b9fb890b3965f8b2ef5b0528ae53f607e6d0379737
-
SSDEEP
768:R+SEjnwCkJjukg+4s/hrwWFyz9FE6OjhDQMQJGQAsGkK23u:RSja6u40J/FC9FE6Oj3fQAsGkK23u
Malware Config
Extracted
Family
xworm
Version
5.0
Mutex
cGDrirmzU5eLYUoi
Attributes
-
Install_directory
%AppData%
-
install_file
RobloxGraphics.exe
-
pastebin_url
https://pastebin.com/raw/ZdGpTLd0
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3836-1-0x0000000000610000-0x0000000000630000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RobloxGraphics.lnk VMXModMenu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RobloxGraphics.lnk VMXModMenu.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 44 IoCs
flow ioc 102 pastebin.com 103 pastebin.com 106 pastebin.com 36 pastebin.com 37 pastebin.com 72 pastebin.com 74 pastebin.com 84 pastebin.com 92 pastebin.com 96 pastebin.com 42 pastebin.com 43 pastebin.com 68 pastebin.com 108 pastebin.com 41 pastebin.com 94 pastebin.com 95 pastebin.com 104 pastebin.com 107 pastebin.com 46 pastebin.com 69 pastebin.com 73 pastebin.com 75 pastebin.com 86 pastebin.com 105 pastebin.com 64 pastebin.com 87 pastebin.com 39 pastebin.com 83 pastebin.com 89 pastebin.com 93 pastebin.com 40 pastebin.com 70 pastebin.com 78 pastebin.com 88 pastebin.com 97 pastebin.com 98 pastebin.com 99 pastebin.com 100 pastebin.com 71 pastebin.com 81 pastebin.com 82 pastebin.com 85 pastebin.com 101 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3836 VMXModMenu.exe