Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 03:30
Behavioral task
behavioral1
Sample
XWorm Ping Optimizer.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
XWorm Ping Optimizer.exe
Resource
win10v2004-20230915-en
General
-
Target
XWorm Ping Optimizer.exe
-
Size
209KB
-
MD5
43bb693a4d3ca23a85015b487f0db69a
-
SHA1
4a29501c02988e111c2c6c9dccdbd135c119a4e8
-
SHA256
f645030d125dac92a38f919cc0b134f7cba5f70f0fc5ce421a532dfe1515c22e
-
SHA512
3694b42ef2f8ad357df9934349c100a0fd6a8386c7859ee1299bc34ba200429ac9584695a174050c425c91f120d9f40091773963e9a3427c323f614a36b7ca13
-
SSDEEP
3072:ugUv1gB5CLa9bqqsBoO/Ya1W7T4MxK08cnNizrQxs/DrGQG3v9RfPJ:uJ1I5CLqbYlIT4MxKJzrAP
Malware Config
Extracted
xworm
functions-screensavers.gl.at.ply.gg:11035
-
Install_directory
%Temp%
-
install_file
XWorm Auto Updater.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1896-1-0x0000000000BA0000-0x0000000000BD8000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm Auto Updater.lnk XWorm Ping Optimizer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm Auto Updater.lnk XWorm Ping Optimizer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\XWorm Auto Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XWorm Auto Updater.exe" XWorm Ping Optimizer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2572 powershell.exe 2808 powershell.exe 2428 powershell.exe 1924 powershell.exe 1896 XWorm Ping Optimizer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1896 XWorm Ping Optimizer.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 1896 XWorm Ping Optimizer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1896 XWorm Ping Optimizer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2572 1896 XWorm Ping Optimizer.exe 30 PID 1896 wrote to memory of 2572 1896 XWorm Ping Optimizer.exe 30 PID 1896 wrote to memory of 2572 1896 XWorm Ping Optimizer.exe 30 PID 1896 wrote to memory of 2808 1896 XWorm Ping Optimizer.exe 32 PID 1896 wrote to memory of 2808 1896 XWorm Ping Optimizer.exe 32 PID 1896 wrote to memory of 2808 1896 XWorm Ping Optimizer.exe 32 PID 1896 wrote to memory of 2428 1896 XWorm Ping Optimizer.exe 35 PID 1896 wrote to memory of 2428 1896 XWorm Ping Optimizer.exe 35 PID 1896 wrote to memory of 2428 1896 XWorm Ping Optimizer.exe 35 PID 1896 wrote to memory of 1924 1896 XWorm Ping Optimizer.exe 36 PID 1896 wrote to memory of 1924 1896 XWorm Ping Optimizer.exe 36 PID 1896 wrote to memory of 1924 1896 XWorm Ping Optimizer.exe 36 PID 1896 wrote to memory of 2000 1896 XWorm Ping Optimizer.exe 39 PID 1896 wrote to memory of 2000 1896 XWorm Ping Optimizer.exe 39 PID 1896 wrote to memory of 2000 1896 XWorm Ping Optimizer.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm Ping Optimizer.exe"C:\Users\Admin\AppData\Local\Temp\XWorm Ping Optimizer.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XWorm Ping Optimizer.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XWorm Ping Optimizer.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XWorm Auto Updater.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWorm Auto Updater" /tr "C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater.exe"2⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B6072E8C-4B3E-4B7B-8185-BE9809C7552B} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5aaac3959f00c4858fa1956a88aa4c557
SHA18d3c58db530d0b62d49da7c17ec32f9fd79572bc
SHA256515d7e602e8256ac07dd527c2e5149cfa158b3f392475fb6c79b8396aa213169
SHA5123dac758c20db344c710ca2cac753abea2487b1ca9f3483eab259b46bfa9a12d57aa950ba772bea84210e8a35414688788a4ec2fbef3480395441a4a431967c77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5aaac3959f00c4858fa1956a88aa4c557
SHA18d3c58db530d0b62d49da7c17ec32f9fd79572bc
SHA256515d7e602e8256ac07dd527c2e5149cfa158b3f392475fb6c79b8396aa213169
SHA5123dac758c20db344c710ca2cac753abea2487b1ca9f3483eab259b46bfa9a12d57aa950ba772bea84210e8a35414688788a4ec2fbef3480395441a4a431967c77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5aaac3959f00c4858fa1956a88aa4c557
SHA18d3c58db530d0b62d49da7c17ec32f9fd79572bc
SHA256515d7e602e8256ac07dd527c2e5149cfa158b3f392475fb6c79b8396aa213169
SHA5123dac758c20db344c710ca2cac753abea2487b1ca9f3483eab259b46bfa9a12d57aa950ba772bea84210e8a35414688788a4ec2fbef3480395441a4a431967c77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\860YQ6IOQSLBEY4XOJ5M.temp
Filesize7KB
MD5aaac3959f00c4858fa1956a88aa4c557
SHA18d3c58db530d0b62d49da7c17ec32f9fd79572bc
SHA256515d7e602e8256ac07dd527c2e5149cfa158b3f392475fb6c79b8396aa213169
SHA5123dac758c20db344c710ca2cac753abea2487b1ca9f3483eab259b46bfa9a12d57aa950ba772bea84210e8a35414688788a4ec2fbef3480395441a4a431967c77