Resubmissions

14-02-2023 20:36

230214-zdxmesga75 7

14-02-2023 20:35

230214-zc9klaga69 1

14-02-2023 20:24

230214-y659laga36 7

14-02-2023 19:55

230214-ym4lnafg98 7

14-02-2023 19:46

230214-yg4pgafc2s 10

14-02-2023 19:39

230214-yc3avafb7s 7

Analysis

  • max time kernel
    326s
  • max time network
    326s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2023 20:24

General

  • Target

    https://anonfiles.com/o2r5R7Wfy5/XWorm_V3.1_zip

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" https://anonfiles.com/o2r5R7Wfy5/XWorm_V3.1_zip
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://anonfiles.com/o2r5R7Wfy5/XWorm_V3.1_zip
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1472.0.1531208277\1850615466" -parentBuildID 20200403170909 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 1 -prefMapSize 219796 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1472 "\\.\pipe\gecko-crash-server-pipe.1472" 1260 gpu
        3⤵
          PID:1704
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1472.3.1807515898\460576076" -childID 1 -isForBrowser -prefsHandle 1768 -prefMapHandle 1760 -prefsLen 156 -prefMapSize 219796 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1472 "\\.\pipe\gecko-crash-server-pipe.1472" 1592 tab
          3⤵
            PID:960
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1472.13.533335279\1410860832" -childID 2 -isForBrowser -prefsHandle 2664 -prefMapHandle 2660 -prefsLen 6938 -prefMapSize 219796 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1472 "\\.\pipe\gecko-crash-server-pipe.1472" 2676 tab
            3⤵
              PID:1212
        • C:\Program Files\7-Zip\7zG.exe
          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm V3.1\" -spe -an -ai#7zMap3778:82:7zEvent28492
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2516
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x560
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2588
        • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\XWorm V3.1.exe
          "C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\XWorm V3.1.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2896
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://evilcoder.sellix.io/
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            PID:2644
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:2
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2712
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:2132

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            fc4666cbca561e864e7fdf883a9e6661

            SHA1

            2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

            SHA256

            10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

            SHA512

            c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            56b5b037ec43e54f96a8e583c9bdfedd

            SHA1

            3ec1278a6021f39c71271d5da5265ed5475e747c

            SHA256

            db62f75cc718042be40fcf8d5651699bd6ead2af9a750a0bcd54f5aa23d88dd7

            SHA512

            7e788b3819abb97cbcd1aaeaefe77a9e5066b51a80139f8e6158ecf95723c3438d467b4fdcd2439b2020acd3674d797a883fe6aac87aa224f4d53ed2f9abf8ec

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

            Filesize

            20KB

            MD5

            761f1c18a0472b7d02967150010c345e

            SHA1

            7086c2d47b6aecc56c5780b99151cf287b576dac

            SHA256

            25f8619b2accd5645e2cd7f699db800017e911c3cf52cb7562b2c921a95c7344

            SHA512

            6093088279bff3e5e50660a6c0d7c2fdfcd7082627ced6bb00c2e3361e7d235549a048819dfe176f8412c806989a3ee9e8094fd31670ecdbcd46ad90e32e6c9f

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FNORGVHQ.txt

            Filesize

            606B

            MD5

            4be890f15f67cea9af925e95ce39c10c

            SHA1

            73182194e79dc82dd28adaddb75758d2b9339d7f

            SHA256

            4b33e98cfffc259a2944bc7feddde946445ecba71f7ddd58a738e4f420c19611

            SHA512

            1ed1f3f6eddbaf3912c413606bfe4f2bab165d7bac0be64c21dd7ef4beeb0eb55ba3e3376a8849fb05d03b3f9c1a5680a706b69df9b96fc442445f6656e8b888

          • C:\Users\Admin\Downloads\XWorm V3.1.zip

            Filesize

            26.0MB

            MD5

            ecd4e67a1348937b5bc87adb9f3a0bbf

            SHA1

            733f9348d8502bcfe806a70b505310d3a0dfe5bb

            SHA256

            196492fd93a1a3d3ed70fab37c250c30061005344ff73d4db7d1b548e7276e06

            SHA512

            65a614581cca29bdeb52741a8d9889f424fece40f60584abed3d8573c490846232d6e21ddb2cc419c288cd5e09db341e1efe744deb28e64e484e89dc6a84eea4

          • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\GeoIP.dat

            Filesize

            1.2MB

            MD5

            8ef41798df108ce9bd41382c9721b1c9

            SHA1

            1e6227635a12039f4d380531b032bf773f0e6de0

            SHA256

            bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

            SHA512

            4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

          • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\Intro.wav

            Filesize

            1.7MB

            MD5

            dc28d546b643c5a33c292ae32d7cf43b

            SHA1

            b1f891265914eea6926df765bce0f73f8d9d6741

            SHA256

            20dcc4f50eb47cafda7926735df9ef8241598b83e233066ea495d4b8aa818851

            SHA512

            9d8c1bb61b6f564044aad931e685387df9bc00a92ab5efe7191b94a3d45c7d98a6f71d8ae5668252d6a7b5b44ab6704464d688772aedac8bdb2773d5765d4d56

          • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\XWorm V3.1.exe

            Filesize

            6.9MB

            MD5

            37a9fdc56e605d2342da88a6e6182b4b

            SHA1

            20bc3df33bbbb676d2a3c572cff4c1d58c79055d

            SHA256

            422ba689937e3748a4b6bd3c5af2dce0211e8a48eb25767e6d1d2192d27f1f58

            SHA512

            f556805142b77b549845c0fa2206a4cb29d54752dc5650d9db58c1bbe1f7d0fc15ce04551853fb6454873877dbb88bebd15d81b875b405cdcc2fd21a515820d3

          • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\XWorm V3.1.exe

            Filesize

            6.9MB

            MD5

            37a9fdc56e605d2342da88a6e6182b4b

            SHA1

            20bc3df33bbbb676d2a3c572cff4c1d58c79055d

            SHA256

            422ba689937e3748a4b6bd3c5af2dce0211e8a48eb25767e6d1d2192d27f1f58

            SHA512

            f556805142b77b549845c0fa2206a4cb29d54752dc5650d9db58c1bbe1f7d0fc15ce04551853fb6454873877dbb88bebd15d81b875b405cdcc2fd21a515820d3

          • C:\Users\Admin\Downloads\XWorm V3.1\XWorm V3.1\XWorm V3.1.exe.config

            Filesize

            183B

            MD5

            66f09a3993dcae94acfe39d45b553f58

            SHA1

            9d09f8e22d464f7021d7f713269b8169aed98682

            SHA256

            7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

            SHA512

            c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

          • memory/2516-54-0x000007FEFC141000-0x000007FEFC143000-memory.dmp

            Filesize

            8KB

          • memory/2896-62-0x000000001B6E6000-0x000000001B705000-memory.dmp

            Filesize

            124KB

          • memory/2896-61-0x000000001B6E6000-0x000000001B705000-memory.dmp

            Filesize

            124KB

          • memory/2896-60-0x000000001EA50000-0x000000001F5BA000-memory.dmp

            Filesize

            11.4MB

          • memory/2896-59-0x0000000000250000-0x0000000000946000-memory.dmp

            Filesize

            7.0MB

          • memory/2896-69-0x000000001B6E6000-0x000000001B705000-memory.dmp

            Filesize

            124KB