Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
XWormContent.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
XWormContent.exe
Resource
win10v2004-20230220-en
General
-
Target
XWormContent.exe
-
Size
10KB
-
MD5
7d4e7449b76c34210100ea88c163c7fb
-
SHA1
ef679b47eb42f162355e8772ceb25712dc7ec75e
-
SHA256
4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6
-
SHA512
d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e
-
SSDEEP
192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe -
Drops file in Windows directory 6 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\XWormContent.exe cmd.exe File opened for modification C:\Windows\XWormContent.exe cmd.exe File created C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\win.ini cmd.exe File opened for modification C:\Windows\system.ini cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 688 timeout.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
XWormContent.execmd.exedescription pid process target process PID 1736 wrote to memory of 1644 1736 XWormContent.exe cmd.exe PID 1736 wrote to memory of 1644 1736 XWormContent.exe cmd.exe PID 1736 wrote to memory of 1644 1736 XWormContent.exe cmd.exe PID 1644 wrote to memory of 688 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 688 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 688 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 1880 1644 cmd.exe reg.exe PID 1644 wrote to memory of 1880 1644 cmd.exe reg.exe PID 1644 wrote to memory of 1880 1644 cmd.exe reg.exe PID 1644 wrote to memory of 1916 1644 cmd.exe reg.exe PID 1644 wrote to memory of 1916 1644 cmd.exe reg.exe PID 1644 wrote to memory of 1916 1644 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\timeout.exetimeout -t 33⤵
- Delays execution with timeout.exe
PID:688
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1880
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2