Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    2ee9655c23e38841be4731180b89a967.exe

  • Size

    68KB

  • MD5

    2ee9655c23e38841be4731180b89a967

  • SHA1

    092f21246d35e965195a1fc24a78f92c0173d79d

  • SHA256

    73b62e276faa18be5bb73c9f26ba43c6dd456cf6999db0f995c06f9041c4bf83

  • SHA512

    2555327bdeeb5e2de612862bd9c3dfbc5cce7fed9f1abbfe577549bcfacfb6efbc8f92df23d6f87058a2f5e14eb4b9cc3f329a8fc6bfb80ceb0099139c0f3a0c

  • SSDEEP

    1536:qpNdh5WbHFnvL1FJOOmbk4G6Z5ax4J2/N6VHdyiJUkObc9J:qjdzOnvLzJtmbk/Y5a+vH/JUkObc9J

Score
10/10

Malware Config

Extracted

Family

xworm

C2

activity-majority.gl.at.ply.gg:44249

Attributes
  • Install_directory

    %Public%

  • install_file

    Runtime Broker.exe

  • telegram

    https://api.telegram.org/bot7657358333:AAGqjkQn3Y1tidi4Fg35oc8a1cgXRB-oI2U/sendMessage?chat_id=5998738333

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee9655c23e38841be4731180b89a967.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee9655c23e38841be4731180b89a967.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2280-0-0x000007FEF59F3000-0x000007FEF59F4000-memory.dmp

    Filesize

    4KB

  • memory/2280-1-0x00000000003B0000-0x00000000003C8000-memory.dmp

    Filesize

    96KB

  • memory/2280-2-0x000007FEF59F0000-0x000007FEF63DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2280-3-0x000007FEF59F0000-0x000007FEF63DC000-memory.dmp

    Filesize

    9.9MB