Analysis
-
max time kernel
123s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 17:14
Behavioral task
behavioral1
Sample
kosom.exe
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
kosom.exe
-
Size
30KB
-
MD5
5cf4a1f272de59123997ab014820da98
-
SHA1
2e18de3b11979fffbb7ba990b32ec37d9e528cb0
-
SHA256
0df47fd491c9bf62e9948b9a952d75d2ca4cdeeca696ac71ccd1016a9f348b19
-
SHA512
44c21ebc2cc4f5a665f2388d1ba00d30d8e0b0569069fc12eed33b463820027ad6e135777d8feb245c9f2e3f4f2c128a7f8b18e531f8d7ed2d68078ad2f575fd
-
SSDEEP
384:p7wTA+5OfPgEBQqWvfcQLZe3sK0hYACSqR/inw2uRugtFuBLTIOZw/WVnvn9IkV1:JrgECfLHKMYAoR/iw2uBFE9RgOqhNbg
Malware Config
Extracted
Family
xworm
Version
3.1
C2
show-commentary.gl.at.ply.gg:19243
Mutex
TJBpUvAwYAstsP7U
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2188-1-0x00000000002C0000-0x00000000002CE000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 kosom.exe