Analysis
-
max time kernel
50s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 19:09
Behavioral task
behavioral1
Sample
XWorm_v5.2.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
XWorm_v5.2.exe
Resource
win10v2004-20240221-en
General
-
Target
XWorm_v5.2.exe
-
Size
62KB
-
MD5
3a5d9295a7d1dad3418d52899f4c90ea
-
SHA1
6448c5f880e2fac4a115324b9d8908f9adeaa22b
-
SHA256
cd7b2b4e605b3d56f3c5a09df11430caf2d659d7dbe14001fd6023fd223e3414
-
SHA512
125b06b3aca1a7f670338e18893fcb6cd97669c1dda2479111f6072fcc9ba80df03b4857fc7d30f23893383e2dbfd22b1ef28a86e5286da230286bb9aea73f59
-
SSDEEP
1536:ot5kWNzCRWhSv0RLd1eH86rerkb1WJX4/Ox+0lXSu:g5LzCRWbhocNrkb1T/Ox+0lXSu
Malware Config
Extracted
xworm
127.0.0.1:7000
-
Install_directory
%Temp%
-
install_file
XWorm_v5.2.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1540-0-0x0000000001270000-0x0000000001286000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm_v5.2.lnk XWorm_v5.2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm_v5.2.lnk XWorm_v5.2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\XWorm_v5.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XWorm_v5.2.exe" XWorm_v5.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1540 XWorm_v5.2.exe Token: SeDebugPrivilege 1540 XWorm_v5.2.exe Token: SeDebugPrivilege 2388 XWorm_v5.2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1840 1540 XWorm_v5.2.exe 28 PID 1540 wrote to memory of 1840 1540 XWorm_v5.2.exe 28 PID 1540 wrote to memory of 1840 1540 XWorm_v5.2.exe 28 PID 2540 wrote to memory of 2388 2540 taskeng.exe 33 PID 2540 wrote to memory of 2388 2540 taskeng.exe 33 PID 2540 wrote to memory of 2388 2540 taskeng.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm_v5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm_v5.2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWorm_v5.2" /tr "C:\Users\Admin\AppData\Local\Temp\XWorm_v5.2.exe"2⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BD68411E-39B1-4459-A33B-201E696F77E1} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\XWorm_v5.2.exeC:\Users\Admin\AppData\Local\Temp\XWorm_v5.2.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-