Analysis

  • max time kernel
    131s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 11:41

General

  • Target

    ing.png.exe

  • Size

    815KB

  • MD5

    0e6661bdcb33fed46336ed39d8f71fdd

  • SHA1

    fea97f35f26736bdbc8b982238aceadc5adc3af0

  • SHA256

    bab68a78b1116403210048871e781ae67207702c611dbc4b3923f79e68168948

  • SHA512

    0745a4bd7c845972761233924c14cfb574deb403903ebd687d51511c47cc1dea3c34df9543cef20c4c85227efd33145e1b3523ec4273b4e902460f585b3a833a

  • SSDEEP

    12288:yCQjgAtAHM+vetZxF5EWry8AJGy0eurNcsqPz7rTBFx+i6CgbXwwefZHXPl:y5ZWs+OZVEWry8AF2rqPnrtFxDgbeR9

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

85.203.4.146:7000

Mutex

691v03c0g8lz9y97

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ing.png.exe
    "C:\Users\Admin\AppData\Local\Temp\ing.png.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\server_4.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\server_4.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4544
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3468,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=4124 /prefetch:8
    1⤵
      PID:880

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\server_4.exe

            Filesize

            105KB

            MD5

            5f9b4293a823d01bc72e2236a7844df2

            SHA1

            e58e40a4b7c1bed5e41dbffd64a27b8bf1968969

            SHA256

            972dc0b6a6abad6fe585b2d21c70f01cde423e4b7baf6a7e75d1e0670823f482

            SHA512

            9f9d4594cd9029f2dee8e9787f783e8a71ed9b84783f6510e9ac3e6d0f44b5e74eb294506e8de063811acb4ed34695ed681275b1a19e596c759ddf437a73789c

          • memory/4544-14-0x00007FFF90D63000-0x00007FFF90D65000-memory.dmp

            Filesize

            8KB

          • memory/4544-15-0x0000000000570000-0x0000000000590000-memory.dmp

            Filesize

            128KB

          • memory/4544-16-0x00007FFF90D60000-0x00007FFF91821000-memory.dmp

            Filesize

            10.8MB

          • memory/4544-21-0x00007FFF90D63000-0x00007FFF90D65000-memory.dmp

            Filesize

            8KB

          • memory/4544-22-0x00007FFF90D60000-0x00007FFF91821000-memory.dmp

            Filesize

            10.8MB