Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 01:10

General

  • Target

    XWormContent.exe

  • Size

    10KB

  • MD5

    7d4e7449b76c34210100ea88c163c7fb

  • SHA1

    ef679b47eb42f162355e8772ceb25712dc7ec75e

  • SHA256

    4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6

  • SHA512

    d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e

  • SSDEEP

    192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWormContent.exe
    "C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\system32\timeout.exe
        timeout -t 3
        3⤵
        • Delays execution with timeout.exe
        PID:1712
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:580
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cmd.bat

    Filesize

    1KB

    MD5

    9ed2e107d38ab102bfe7614cfd24e829

    SHA1

    9541263008adf001fa4c3a0236f627223380d509

    SHA256

    b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

    SHA512

    31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

  • C:\Users\Admin\AppData\Local\Temp\cmd.bat

    Filesize

    1KB

    MD5

    9ed2e107d38ab102bfe7614cfd24e829

    SHA1

    9541263008adf001fa4c3a0236f627223380d509

    SHA256

    b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

    SHA512

    31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

  • memory/884-54-0x0000000000CD0000-0x0000000000CD8000-memory.dmp

    Filesize

    32KB