Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe

Overview

General Information

Sample name:17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe
Analysis ID:1578606
MD5:a415ad882030ab58b145cb02953d26ce
SHA1:194000e48d07889ab77cd856d1f601413d13db99
SHA256:e6ab65e7dcf0aabce0cf14be44dd70e7b8a1eaae1471e81b9a1144f000391463
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

XWorm
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XWorm
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

{"C2 url": ["recovery.work.gd"], "Port": 1999, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeJoeSecurity_XWormYara detected XWormJoe Security
    17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x7a87:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7b24:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7c39:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x78c0:$cnc4: POST / HTTP/1.1
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeMalware Configuration Extractor: Xworm {"C2 url": ["recovery.work.gd"], "Port": 1999, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeReversingLabs: Detection: 50%
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: recovery.work.gd
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: 1999
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: <123456789>
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: <Xwormmm>
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: Primas_24
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: USB.exe
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: %LocalAppData%
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString decryptor: notepad.exe
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: recovery.work.gd
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeString found in binary or memory: https://rentry.co/8wum7vax/raw

    System Summary

    barindex
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeBinary or memory string: OriginalFilenameXClient.exe4 vs 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
    Source: classification engineClassification label: mal84.troj.winEXE@0/0@0/0
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeReversingLabs: Detection: 50%
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe50%ReversingLabsWin32.Backdoor.XWormRAT
    17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0035.t-0009.t-msedge.net
    13.107.246.63
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      recovery.work.gdtrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://rentry.co/8wum7vax/raw17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exefalse
          high
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1578606
          Start date and time:2024-12-19 23:30:57 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 45s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:1
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe
          Detection:MAL
          Classification:mal84.troj.winEXE@0/0@0/0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Unable to launch sample, stop analysis
          • No process behavior to analyse as no analysis process or sample was found
          • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Excluded IPs from analysis (whitelisted): 13.107.246.63
          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
          • VT rate limit hit for: 17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe
          No simulations
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          s-part-0035.t-0009.t-msedge.net1734647108c2d815e9b224b58a4453e937ebbee326356eaa9618758f1ee8f3e412a78fcc82730.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
          • 13.107.246.63
          1734647107844cefc30e20a3cfa75326746e701b95e6b08e7c9f9df9ee9dffdfb305989914130.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
          • 13.107.246.63
          17346471071327285ef086de4665e082957c3e792cf4eed0d7926676db9f12a7d8cce93192399.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
          • 13.107.246.63
          1734647108deb38ffd55bf4ee0e1256f32366f93320efa5c08106fb229cd97f7a3c54ee7b3565.dat-decoded.exeGet hashmaliciousQuasarBrowse
          • 13.107.246.63
          file.exeGet hashmaliciousScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, VidarBrowse
          • 13.107.246.63
          Gioia Faggioli-End Of Year-Bonus.docxGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          dz6dQWx0DD.dllGet hashmaliciousNitolBrowse
          • 13.107.246.63
          Eallentoff_401k_1484013830.htmlGet hashmaliciousHTMLPhisherBrowse
          • 13.107.246.63
          INVOICE-0098.pdf ... .lnk.lnk.d.lnkGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          hnghksdjfhs19De.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
          • 13.107.246.63
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.60402165942935
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          • Win32 Executable (generic) a (10002005/4) 49.75%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          File name:17346471075cda6f52d28bb99d0fb4a0a36b95ba9175e33925cffe8347818dc425c0939518385.dat-decoded.exe
          File size:37'218 bytes
          MD5:a415ad882030ab58b145cb02953d26ce
          SHA1:194000e48d07889ab77cd856d1f601413d13db99
          SHA256:e6ab65e7dcf0aabce0cf14be44dd70e7b8a1eaae1471e81b9a1144f000391463
          SHA512:06641656e1594fd7f77c0d345261a6c6dfb83f14a32d034cf27cf3305747b6e0edb77d35d6f4d5aee1e56ef79d4740129081c4abac9afffc5dcb06bd84f2d0a3
          SSDEEP:768:OoEZDEXo4pg4uaksIq1VFyj9bVOOlhXywa:OoEZDEXoVaksIqTFc9bVOOllZa
          TLSH:14F24B0877D44722D5ED5FF56AB3A1024679F6078823EB5F4CD884DA2B337D28A023E6
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v.Pg................................. ........@.. ....................................@................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x40a50e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x6750BD76 [Wed Dec 4 20:37:10 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:
          Instruction
          add dword ptr [ebp-7DEDE2EEh], 051D1261h
          pop es
          add cl, byte ptr [esi]
          sbb eax, 07070E1Ch
          sbb eax, 82120E05h
          cmp eax, 08054112h
          sbb eax, 02200905h
          adc al, byte ptr [eax-7DEEF12Bh]
          jno 00007FCC607E159Ah
          and byte ptr [ebx], al
          add dword ptr [esi], ecx
          sbb al, 11h
          xor byte ptr [ebp+09h], 00000007h
          add eax, dword ptr [edx]
          adc al, byte ptr [eax-667FED2Bh]
          push es
          and byte ptr [ecx], al
          adc al, byte ptr [eax+070B0ED5h]
          add al, 1Dh
          add eax, 1CD58012h
          adc al, byte ptr [eax+02000699h]
          or byte ptr [00040805h], bl
          add dword ptr [eax], ecx
          sbb al, 10h
          pop es
          or dword ptr [1D1C1C05h], ebx
          add eax, 1C1D1C1Ch
          sbb eax, 05021D1Ch
          add byte ptr [ecx], al
          sbb eax, 070D0805h
          pop es
          sbb eax, 1C1C1C05h
          sbb eax, 1D1C1D1Ch
          add dl, byte ptr [edx]
          pop es
          push es
          adc al, byte ptr [edx+12051D35h]
          cmp byte ptr [8212051Dh], 00000039h
          adc al, byte ptr [eax+03200799h]
          add dword ptr [edx], eax
          push cs
          adc byte ptr [edx], al
          add al, 07h
          add al, byte ptr [edx]
          add al, byte ptr [esi]
          and byte ptr [ecx], al
          add dword ptr [ecx], edx
          add byte ptr [ecx+01080801h], 00000000h
          or byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          push ds
          add dword ptr [eax], eax
          add dword ptr [eax], eax
          push esp
          add dl, byte ptr [esi]
          push edi
          jc 00007FCC607E15F3h
          jo 00007FCC607E15E0h
          outsd
          outsb
          inc ebp
          js 00007FCC607E15F5h
          jo 00007FCC607E1607h
          imul ebp, dword ptr [edi+00h], 00000000h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xa4bc0x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4d8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x85140x86001cca0d2881e14144bf20bfc3c9485d4eFalse0.4981926305970149data5.769016579086216IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0xc0000x4d80x6004a1fa6a8f336d577d96569112413936bFalse0.4036458333333333data3.796137077828513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0xe0000xc0x2009d7c92dfc6b979c918fc7d5b05577cb7False0.140625data1.003267243218549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 19, 2024 23:31:56.847624063 CET1.1.1.1192.168.2.110xe9afNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
          Dec 19, 2024 23:31:56.847624063 CET1.1.1.1192.168.2.110xe9afNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
          No statistics
          No system behavior
          No disassembly