Analysis

  • max time kernel
    126s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    2ee9655c23e38841be4731180b89a967.exe

  • Size

    68KB

  • MD5

    2ee9655c23e38841be4731180b89a967

  • SHA1

    092f21246d35e965195a1fc24a78f92c0173d79d

  • SHA256

    73b62e276faa18be5bb73c9f26ba43c6dd456cf6999db0f995c06f9041c4bf83

  • SHA512

    2555327bdeeb5e2de612862bd9c3dfbc5cce7fed9f1abbfe577549bcfacfb6efbc8f92df23d6f87058a2f5e14eb4b9cc3f329a8fc6bfb80ceb0099139c0f3a0c

  • SSDEEP

    1536:qpNdh5WbHFnvL1FJOOmbk4G6Z5ax4J2/N6VHdyiJUkObc9J:qjdzOnvLzJtmbk/Y5a+vH/JUkObc9J

Score
10/10

Malware Config

Extracted

Family

xworm

C2

activity-majority.gl.at.ply.gg:44249

Attributes
  • Install_directory

    %Public%

  • install_file

    Runtime Broker.exe

  • telegram

    https://api.telegram.org/bot7657358333:AAGqjkQn3Y1tidi4Fg35oc8a1cgXRB-oI2U/sendMessage?chat_id=5998738333

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee9655c23e38841be4731180b89a967.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee9655c23e38841be4731180b89a967.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3344-0-0x00007FFE5C3B3000-0x00007FFE5C3B5000-memory.dmp

    Filesize

    8KB

  • memory/3344-1-0x0000000000E50000-0x0000000000E68000-memory.dmp

    Filesize

    96KB

  • memory/3344-2-0x00007FFE5C3B0000-0x00007FFE5CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/3344-3-0x00007FFE5C3B0000-0x00007FFE5CE71000-memory.dmp

    Filesize

    10.8MB