Analysis

  • max time kernel
    129s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 18:07

General

  • Target

    XCliente.exe

  • Size

    30KB

  • MD5

    b332466e7ad8264e2845d31415725f42

  • SHA1

    141d8093915d85fac1501d06a87ba901c39b8107

  • SHA256

    2d5050ca25920cb7a52aa4f77f1ed6a2ce4766d240eba793bac4b14af7d0681f

  • SHA512

    a60b7398ac9d92089994e9125e7259e9cca83bb05070a31a092d89122b76394905c1d07111b94756cf4fc91942296acb989498b1870b65d3fd29897e12d1a57a

  • SSDEEP

    384:ueAwIGmeffcbWICWv/0ILZGPcj0hYACSqR/inw2uRugtFuBLTIOZw/WVnvn9IkVO:+ecbl/b3jMYAoR/iw2uBFE9RYOqhtb3

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

192.168.1.114:1177

Mutex

roEOWd2CTFvG3l1K

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XCliente.exe
    "C:\Users\Admin\AppData\Local\Temp\XCliente.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1712-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/1712-1-0x0000000000970000-0x000000000097E000-memory.dmp

    Filesize

    56KB

  • memory/1712-2-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/1712-3-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/1712-4-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB