Analysis
-
max time kernel
369s -
max time network
348s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 21:24
Behavioral task
behavioral1
Sample
XWorm-RAT-xworm-rat.zip
Resource
win7-20220812-en
General
-
Target
XWorm-RAT-xworm-rat.zip
-
Size
33.7MB
-
MD5
57a2bc809b05e1912ae749c9db34071b
-
SHA1
501c7d841e2662aa3f9c2b7e28b7a844b899a300
-
SHA256
491e6d13ca77846445824b492df95e7294f908c568819d839eecb82ea986d608
-
SHA512
49edc2b21433e1c132d96fa59f7dd6588d05de7ab1206bc210aa319817fb5ada49647e9f68f5dc682cac0f89d825bc4cbe97c31476bb63feeeb5e8da13e20769
-
SSDEEP
786432:mjDPlNpEQ4AXvvAQAIHHCspkclWQe5LDQXzTnHB35TAu93biIKJ:GxDEuXHAInCsdAtfWh35TT3W/
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Win-XwormRat-V2.1-builder.exewin-xworm-builder.exexwarm-rat-builder.exeUpdate.exeWin-XwormRat-V2.1-builder.exepid process 3220 Win-XwormRat-V2.1-builder.exe 784 win-xworm-builder.exe 4512 xwarm-rat-builder.exe 4688 Update.exe 4856 Win-XwormRat-V2.1-builder.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Win-XwormRat-V2.1-builder.exewin-xworm-builder.exeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Win-XwormRat-V2.1-builder.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation win-xworm-builder.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2144 4688 WerFault.exe Update.exe 2968 4856 WerFault.exe Win-XwormRat-V2.1-builder.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1852 schtasks.exe 4984 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3240 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Win-XwormRat-V2.1-builder.exeUpdate.exepid process 4856 Win-XwormRat-V2.1-builder.exe 4688 Update.exe 4688 Update.exe 4688 Update.exe 4688 Update.exe 4688 Update.exe 4688 Update.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
7zG.exeWin-XwormRat-V2.1-builder.exewin-xworm-builder.exetasklist.exeUpdate.exeWin-XwormRat-V2.1-builder.exedescription pid process Token: SeRestorePrivilege 3280 7zG.exe Token: 35 3280 7zG.exe Token: SeSecurityPrivilege 3280 7zG.exe Token: SeSecurityPrivilege 3280 7zG.exe Token: SeDebugPrivilege 3220 Win-XwormRat-V2.1-builder.exe Token: SeDebugPrivilege 784 win-xworm-builder.exe Token: SeDebugPrivilege 2800 tasklist.exe Token: SeDebugPrivilege 4688 Update.exe Token: SeDebugPrivilege 4856 Win-XwormRat-V2.1-builder.exe Token: SeDebugPrivilege 4688 Update.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid process 3280 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid process 4688 Update.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Win-XwormRat-V2.1-builder.exewin-xworm-builder.execmd.exeUpdate.exedescription pid process target process PID 3220 wrote to memory of 784 3220 Win-XwormRat-V2.1-builder.exe win-xworm-builder.exe PID 3220 wrote to memory of 784 3220 Win-XwormRat-V2.1-builder.exe win-xworm-builder.exe PID 3220 wrote to memory of 4512 3220 Win-XwormRat-V2.1-builder.exe xwarm-rat-builder.exe PID 3220 wrote to memory of 4512 3220 Win-XwormRat-V2.1-builder.exe xwarm-rat-builder.exe PID 3220 wrote to memory of 4512 3220 Win-XwormRat-V2.1-builder.exe xwarm-rat-builder.exe PID 784 wrote to memory of 1852 784 win-xworm-builder.exe schtasks.exe PID 784 wrote to memory of 1852 784 win-xworm-builder.exe schtasks.exe PID 784 wrote to memory of 4444 784 win-xworm-builder.exe cmd.exe PID 784 wrote to memory of 4444 784 win-xworm-builder.exe cmd.exe PID 4444 wrote to memory of 2800 4444 cmd.exe tasklist.exe PID 4444 wrote to memory of 2800 4444 cmd.exe tasklist.exe PID 4444 wrote to memory of 4244 4444 cmd.exe find.exe PID 4444 wrote to memory of 4244 4444 cmd.exe find.exe PID 4444 wrote to memory of 3240 4444 cmd.exe timeout.exe PID 4444 wrote to memory of 3240 4444 cmd.exe timeout.exe PID 4444 wrote to memory of 4688 4444 cmd.exe Update.exe PID 4444 wrote to memory of 4688 4444 cmd.exe Update.exe PID 3220 wrote to memory of 4856 3220 Win-XwormRat-V2.1-builder.exe Win-XwormRat-V2.1-builder.exe PID 3220 wrote to memory of 4856 3220 Win-XwormRat-V2.1-builder.exe Win-XwormRat-V2.1-builder.exe PID 4688 wrote to memory of 4984 4688 Update.exe schtasks.exe PID 4688 wrote to memory of 4984 4688 Update.exe schtasks.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\XWorm-RAT-xworm-rat.zip1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\" -spe -an -ai#7zMap16795:96:7zEvent285451⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\Win-XwormRat-V2.1-builder.exe"C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\Win-XwormRat-V2.1-builder.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Static\Update.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF1CF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF1CF.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 784"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind ":"4⤵
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
-
C:\Users\Static\Update.exe"Update.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Static\Update.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4688 -s 24005⤵
- Program crash
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\resource\xwarm-rat-builder.exe"C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\resource\xwarm-rat-builder.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\GQ8H18VE-6NVI-CHX0-KK3H-TA4W246O\Win-XwormRat-V2.1-builder.exe"C:\Users\Admin\AppData\Local\Temp\GQ8H18VE-6NVI-CHX0-KK3H-TA4W246O\Win-XwormRat-V2.1-builder.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4856 -s 13963⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 4688 -ip 46881⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 200 -p 4856 -ip 48561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Win-XwormRat-V2.1-builder.exe.logFilesize
1KB
MD5ef001c9a7396b37a66898e7664dd413c
SHA1d21053a6563bcc49e88f8f16c0fa07f8a9b901e0
SHA256e5fc32e12bcbaf588b8c4265a8679331ff1d4f0f454452c24afb34e0b19eff59
SHA512348346791b277c66fc72f5f5045b662fbedb08bf4a19b685c38b5dc3b30797994840dcca643f3961122dc97f76ca0fbab8e6fad60f52c7eb11b6a0e9e5ffe886
-
C:\Users\Admin\AppData\Local\Temp\GQ8H18VE-6NVI-CHX0-KK3H-TA4W246O\Win-XwormRat-V2.1-builder.exeFilesize
928KB
MD53f0912415a057271df74d28140102c2b
SHA19bc6ee308cb00e4898f3730e933ccb6fa1531366
SHA2566b51cfb8710886fbff64eb1482c0de89bf9075f97dd01b8474f7e60fb362d1b2
SHA5129847c7a2bf6d773e8d2855c14c9266040cf9b8c05b667418eb36f9fb4c76740cbe1cd7a16d85fe04206af85e062bb7d75dd6c0fc23193f86123e24e759b6ed49
-
C:\Users\Admin\AppData\Local\Temp\GQ8H18VE-6NVI-CHX0-KK3H-TA4W246O\Win-XwormRat-V2.1-builder.exeFilesize
928KB
MD53f0912415a057271df74d28140102c2b
SHA19bc6ee308cb00e4898f3730e933ccb6fa1531366
SHA2566b51cfb8710886fbff64eb1482c0de89bf9075f97dd01b8474f7e60fb362d1b2
SHA5129847c7a2bf6d773e8d2855c14c9266040cf9b8c05b667418eb36f9fb4c76740cbe1cd7a16d85fe04206af85e062bb7d75dd6c0fc23193f86123e24e759b6ed49
-
C:\Users\Admin\AppData\Local\Temp\tmpF1CF.tmp.batFilesize
194B
MD584aa3ce5179d96674809bdac13019396
SHA11fe5a8f7d0d91048d5e48778ee304534d0da3dac
SHA256a1268f1d14c5025419ead8a8bf28f56a746fa6282b11fd56940ce7e671abd371
SHA512508c94c199a8d70f148c0235c63120e5afbd7e1c74375f8707289031c883af09d2131ddd81750fd52c99d122737fd03ede32202c77fdbfc9bfdec3726bd9d9b7
-
C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exeFilesize
127KB
MD5f6f686df785d0abdc66d1f90fa508c4b
SHA175f348132001df30cbad9c7cae2e2072fcaca38e
SHA25661b52af14fc66126a4e7f09b3cff7d3c09e5ad35acf23fb9ba43293fac0c995f
SHA5127daa425723caade3ec747fbe6e425e26bc419e1a7dccd6253770fe1a118a8b90e0f40f6cf4bdac259e68a0198a384ed1b5de7515958f5e17e4e35219b9077d77
-
C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exeFilesize
127KB
MD5f6f686df785d0abdc66d1f90fa508c4b
SHA175f348132001df30cbad9c7cae2e2072fcaca38e
SHA25661b52af14fc66126a4e7f09b3cff7d3c09e5ad35acf23fb9ba43293fac0c995f
SHA5127daa425723caade3ec747fbe6e425e26bc419e1a7dccd6253770fe1a118a8b90e0f40f6cf4bdac259e68a0198a384ed1b5de7515958f5e17e4e35219b9077d77
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\Win-XwormRat-V2.1-builder.exeFilesize
928KB
MD53f0912415a057271df74d28140102c2b
SHA19bc6ee308cb00e4898f3730e933ccb6fa1531366
SHA2566b51cfb8710886fbff64eb1482c0de89bf9075f97dd01b8474f7e60fb362d1b2
SHA5129847c7a2bf6d773e8d2855c14c9266040cf9b8c05b667418eb36f9fb4c76740cbe1cd7a16d85fe04206af85e062bb7d75dd6c0fc23193f86123e24e759b6ed49
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\Win-XwormRat-V2.1-builder.exeFilesize
928KB
MD53f0912415a057271df74d28140102c2b
SHA19bc6ee308cb00e4898f3730e933ccb6fa1531366
SHA2566b51cfb8710886fbff64eb1482c0de89bf9075f97dd01b8474f7e60fb362d1b2
SHA5129847c7a2bf6d773e8d2855c14c9266040cf9b8c05b667418eb36f9fb4c76740cbe1cd7a16d85fe04206af85e062bb7d75dd6c0fc23193f86123e24e759b6ed49
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\resource\data.datFilesize
6.5MB
MD5a21db5b6e09c3ec82f048fd7f1c4bb3a
SHA1e7ffb13176d60b79d0b3f60eaea641827f30df64
SHA25667d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5
SHA5127caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\resource\xwarm-rat-builder.exeFilesize
6.5MB
MD5a21db5b6e09c3ec82f048fd7f1c4bb3a
SHA1e7ffb13176d60b79d0b3f60eaea641827f30df64
SHA25667d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5
SHA5127caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c
-
C:\Users\Admin\Desktop\XWorm-RAT-xworm-rat\XWorm RAT V2.1\resource\xwarm-rat-builder.exeFilesize
6.5MB
MD5a21db5b6e09c3ec82f048fd7f1c4bb3a
SHA1e7ffb13176d60b79d0b3f60eaea641827f30df64
SHA25667d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5
SHA5127caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c
-
C:\Users\Static\Update.exeFilesize
127KB
MD5f6f686df785d0abdc66d1f90fa508c4b
SHA175f348132001df30cbad9c7cae2e2072fcaca38e
SHA25661b52af14fc66126a4e7f09b3cff7d3c09e5ad35acf23fb9ba43293fac0c995f
SHA5127daa425723caade3ec747fbe6e425e26bc419e1a7dccd6253770fe1a118a8b90e0f40f6cf4bdac259e68a0198a384ed1b5de7515958f5e17e4e35219b9077d77
-
C:\Users\Static\Update.exeFilesize
127KB
MD5f6f686df785d0abdc66d1f90fa508c4b
SHA175f348132001df30cbad9c7cae2e2072fcaca38e
SHA25661b52af14fc66126a4e7f09b3cff7d3c09e5ad35acf23fb9ba43293fac0c995f
SHA5127daa425723caade3ec747fbe6e425e26bc419e1a7dccd6253770fe1a118a8b90e0f40f6cf4bdac259e68a0198a384ed1b5de7515958f5e17e4e35219b9077d77
-
memory/784-135-0x0000000000000000-mapping.dmp
-
memory/784-143-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/784-156-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/784-140-0x000002508E470000-0x000002508E496000-memory.dmpFilesize
152KB
-
memory/1852-146-0x0000000000000000-mapping.dmp
-
memory/2800-149-0x0000000000000000-mapping.dmp
-
memory/3220-134-0x000002C367290000-0x000002C36737E000-memory.dmpFilesize
952KB
-
memory/3220-151-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/3220-165-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/3220-158-0x000002C369960000-0x000002C369972000-memory.dmpFilesize
72KB
-
memory/3220-145-0x000002C3699D0000-0x000002C3699DA000-memory.dmpFilesize
40KB
-
memory/3220-139-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/3240-152-0x0000000000000000-mapping.dmp
-
memory/4244-150-0x0000000000000000-mapping.dmp
-
memory/4444-147-0x0000000000000000-mapping.dmp
-
memory/4512-174-0x00000000060D0000-0x0000000006126000-memory.dmpFilesize
344KB
-
memory/4512-141-0x0000000000000000-mapping.dmp
-
memory/4512-172-0x0000000005C70000-0x0000000005C7A000-memory.dmpFilesize
40KB
-
memory/4512-166-0x0000000005AD0000-0x0000000005B6C000-memory.dmpFilesize
624KB
-
memory/4512-159-0x0000000000B10000-0x00000000011A2000-memory.dmpFilesize
6.6MB
-
memory/4512-168-0x0000000006190000-0x0000000006734000-memory.dmpFilesize
5.6MB
-
memory/4512-169-0x0000000005C80000-0x0000000005D12000-memory.dmpFilesize
584KB
-
memory/4688-170-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/4688-157-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/4688-153-0x0000000000000000-mapping.dmp
-
memory/4856-171-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/4856-164-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/4856-173-0x00007FFFED140000-0x00007FFFEDC01000-memory.dmpFilesize
10.8MB
-
memory/4856-160-0x0000000000000000-mapping.dmp
-
memory/4984-167-0x0000000000000000-mapping.dmp