Overview
overview
10Static
static
1055b3d90596...38.exe
windows7-x64
1055b3d90596...38.exe
windows10-2004-x64
1055bc6e4a24...7e.exe
windows7-x64
855bc6e4a24...7e.exe
windows10-2004-x64
855be056b62...2f.exe
windows7-x64
1055be056b62...2f.exe
windows10-2004-x64
1055c90346c1...7d.exe
windows7-x64
755c90346c1...7d.exe
windows10-2004-x64
755e68f668a...36.exe
windows7-x64
1055e68f668a...36.exe
windows10-2004-x64
105600890872...c9.exe
windows7-x64
15600890872...c9.exe
windows10-2004-x64
1563d48f590...69.exe
windows7-x64
7563d48f590...69.exe
windows10-2004-x64
756583e9f6e...61.exe
windows7-x64
1056583e9f6e...61.exe
windows10-2004-x64
10569bb28f26...62.exe
windows7-x64
7569bb28f26...62.exe
windows10-2004-x64
756a0fe7669...54.exe
windows7-x64
1056a0fe7669...54.exe
windows10-2004-x64
1056bf03053c...ec.exe
windows7-x64
1056bf03053c...ec.exe
windows10-2004-x64
1056f180528b...73.exe
windows7-x64
1056f180528b...73.exe
windows10-2004-x64
105737ca76a6...88.exe
windows7-x64
105737ca76a6...88.exe
windows10-2004-x64
10575bc86968...a1.exe
windows7-x64
7575bc86968...a1.exe
windows10-2004-x64
757d8199712...1f.exe
windows7-x64
1057d8199712...1f.exe
windows10-2004-x64
57f8be0d4c...5a.exe
windows7-x64
1057f8be0d4c...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:11
Behavioral task
behavioral1
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win10v2004-20250314-en
General
-
Target
56f180528b74e418299dd53d17305073.exe
-
Size
44KB
-
MD5
56f180528b74e418299dd53d17305073
-
SHA1
2b0e07cca95b2ad12a3a62542d60563fe771d7e5
-
SHA256
f4624b0f6ddcc9063d0860d7f89ce72b65ec788471497cf3ac4e9eec4e9a9971
-
SHA512
da37318c4f3cd4dc636c7fe65f72b8129f8f776cc1b3e968dae5d98fcf9459e146059a8cec04cedb9cfeea8320a17ebef797485f8fac03fc5303e3ac040286c6
-
SSDEEP
768:mb9Am7OYpuHa56hr0ols+qLYMaA+F+t9pfN3ja6iOChbbVL2K:mbOedpu656hrdbeaRFw9Zw6iOCJV5
Malware Config
Extracted
xworm
5.0
Xyxebet-60479.portmap.host:60479
EnF1R23VZslDnAyL
-
Install_directory
%AppData%
-
install_file
svhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral23/memory/2536-1-0x00000000012C0000-0x00000000012D2000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 56f180528b74e418299dd53d17305073.exe