Overview
overview
10Static
static
10XWorm V3.1...nd.png
windows7-x64
1XWorm V3.1...nd.png
windows10-2004-x64
3XWorm V3.1...ox.dll
windows7-x64
1XWorm V3.1...ox.dll
windows10-2004-x64
1XWorm V3.1...er.bat
windows7-x64
5XWorm V3.1...er.bat
windows10-2004-x64
1XWorm V3.1...re.dll
windows7-x64
1XWorm V3.1...re.dll
windows10-2004-x64
1XWorm V3.1...ms.dll
windows7-x64
1XWorm V3.1...ms.dll
windows10-2004-x64
1XWorm V3.1...IP.dat
windows7-x64
3XWorm V3.1...IP.dat
windows10-2004-x64
3XWorm V3.1...or.dll
windows7-x64
1XWorm V3.1...or.dll
windows10-2004-x64
1XWorm V3.1...ro.wav
windows7-x64
1XWorm V3.1...ro.wav
windows10-2004-x64
6XWorm V3.1...or.dll
windows7-x64
1XWorm V3.1...or.dll
windows10-2004-x64
1XWorm V3.1...NC.exe
windows7-x64
10XWorm V3.1...NC.exe
windows10-2004-x64
10XWorm V3.1....1.exe
windows7-x64
1XWorm V3.1....1.exe
windows10-2004-x64
1XWorm V3.1...xe.xml
windows7-x64
1XWorm V3.1...xe.xml
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2023, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
XWorm V3.1 - Copy/Background.png
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XWorm V3.1 - Copy/Background.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
XWorm V3.1 - Copy/FastColoredTextBox.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
XWorm V3.1 - Copy/FastColoredTextBox.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
XWorm V3.1 - Copy/Fixer.bat
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
XWorm V3.1 - Copy/Fixer.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
XWorm V3.1 - Copy/GMap.NET.Core.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
XWorm V3.1 - Copy/GMap.NET.Core.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
XWorm V3.1 - Copy/GMap.NET.WindowsForms.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
XWorm V3.1 - Copy/GMap.NET.WindowsForms.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
XWorm V3.1 - Copy/GeoIP.dat
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
XWorm V3.1 - Copy/GeoIP.dat
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
XWorm V3.1 - Copy/IconExtractor.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
XWorm V3.1 - Copy/IconExtractor.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
XWorm V3.1 - Copy/Intro.wav
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
XWorm V3.1 - Copy/Intro.wav
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
XWorm V3.1 - Copy/SimpleObfuscator.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
XWorm V3.1 - Copy/SimpleObfuscator.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
XWorm V3.1 - Copy/XWorm HVNC.exe
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
XWorm V3.1 - Copy/XWorm HVNC.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
XWorm V3.1 - Copy/XWorm V3.1.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
XWorm V3.1 - Copy/XWorm V3.1.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
XWorm V3.1 - Copy/XWorm V3.1.exe.xml
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
XWorm V3.1 - Copy/XWorm V3.1.exe.xml
Resource
win10v2004-20220812-en
General
-
Target
XWorm V3.1 - Copy/GeoIP.dat
-
Size
1.2MB
-
MD5
8ef41798df108ce9bd41382c9721b1c9
-
SHA1
1e6227635a12039f4d380531b032bf773f0e6de0
-
SHA256
bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
-
SHA512
4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
SSDEEP
24576:0L/59ah0USm3uwl00odi9AnW1fUmdbxv6bA3wOzRAc3InsZLONMrZb:+/59a6USdi9Ues6bV6boLO6rZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 OpenWith.exe