Analysis
-
max time kernel
9s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/03/2025, 11:03
General
-
Target
Steam.exe
-
Size
144KB
-
MD5
a3614a8b3247b24de5c7ffc763dc1caf
-
SHA1
7e3f222bfb753f1ebf1e27569af7a24d42476b9b
-
SHA256
caf4f464d2b19597c8ea779b41599c211d122e74954cc7c03ee2387f616725d1
-
SHA512
203172dbc4f5d07ac850344dbe0085a61eb18a98dfc5985da19c740490807ebdfaebb1c7b71c78b10c04dc97daafb848333b822f6eab4f94fa4974d2dde42430
-
SSDEEP
3072:PmBMigkWAx9bNTz8KQOiOyuT9F/Zj7Iq+gJTefr:bi7WA/bx5QOuyRnh+g
Malware Config
Extracted
Family
xworm
C2
some-event.gl.at.ply.gg:1337
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4888-1-0x0000000000630000-0x000000000065A000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4888 Steam.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Steam.exe"C:\Users\Admin\AppData\Local\Temp\Steam.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=1036,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:141⤵PID:3028