Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 20:30
Behavioral task
behavioral1
Sample
RealtekAudioDriverInstall.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
RealtekAudioDriverInstall.exe
-
Size
40KB
-
MD5
54a6f585c5d3483cb50a4ba17be5ec28
-
SHA1
8226aea9e79c7c82c96536c73db3a09869114230
-
SHA256
73a815655d2337bdf8990075d452ca008b38a0ab318a396ec9f3dc760f7c4d1d
-
SHA512
2b6a2bb52065de1f0c71046c854dbabe2f3b60cf34a06970f962d3359bdbade8eb2fcaf644516eda8d7932ea272c913c04d737cd375a85cd6bac1a7da79a56fd
-
SSDEEP
768:I02yvdzR7qsnAmJRXF425tF5PT95a8bOMhl3Ep:IgR2qAmJ1F42LFx95aGOM7m
Malware Config
Extracted
Family
xworm
Version
5.0
C2
24.243.20.84:7000
Mutex
Tw3DcWk3xR894OD7
Attributes
-
Install_directory
%AppData%
-
install_file
Realtek Audio Driver.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2208-1-0x00000000011B0000-0x00000000011C0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 RealtekAudioDriverInstall.exe