Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 02:17
Behavioral task
behavioral1
Sample
VMXModMenu.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
VMXModMenu.exe
-
Size
101KB
-
MD5
b2ed14da26475b542695dfeb44683e6b
-
SHA1
36fdcf814f1ab5ce4b563c9de97fe16c0c015dfc
-
SHA256
b9533e27109f91d578d381dc1997cc9301f5f8e5625c83b6430182a61e38ece1
-
SHA512
e7a5892ab83a8c9540073575f39d7f968996d7c5e93b7ae2421a9be7ea10a40ca719fabc4532b8bc065c71b9fb890b3965f8b2ef5b0528ae53f607e6d0379737
-
SSDEEP
768:R+SEjnwCkJjukg+4s/hrwWFyz9FE6OjhDQMQJGQAsGkK23u:RSja6u40J/FC9FE6Oj3fQAsGkK23u
Malware Config
Extracted
Family
xworm
Version
5.0
Mutex
cGDrirmzU5eLYUoi
Attributes
-
Install_directory
%AppData%
-
install_file
RobloxGraphics.exe
-
pastebin_url
https://pastebin.com/raw/ZdGpTLd0
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4140-1-0x0000000000FB0000-0x0000000000FD0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RobloxGraphics.lnk VMXModMenu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RobloxGraphics.lnk VMXModMenu.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 46 IoCs
flow ioc 27 pastebin.com 31 pastebin.com 62 pastebin.com 68 pastebin.com 73 pastebin.com 74 pastebin.com 94 pastebin.com 96 pastebin.com 75 pastebin.com 78 pastebin.com 81 pastebin.com 82 pastebin.com 86 pastebin.com 92 pastebin.com 97 pastebin.com 99 pastebin.com 32 pastebin.com 41 pastebin.com 64 pastebin.com 76 pastebin.com 85 pastebin.com 90 pastebin.com 35 pastebin.com 63 pastebin.com 67 pastebin.com 69 pastebin.com 80 pastebin.com 87 pastebin.com 89 pastebin.com 93 pastebin.com 28 pastebin.com 65 pastebin.com 66 pastebin.com 102 pastebin.com 79 pastebin.com 91 pastebin.com 95 pastebin.com 98 pastebin.com 33 pastebin.com 34 pastebin.com 77 pastebin.com 88 pastebin.com 100 pastebin.com 101 pastebin.com 103 pastebin.com 61 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4140 VMXModMenu.exe