General
-
Target
Dropper.exe
-
Size
130KB
-
Sample
240515-ld13ysba2v
-
MD5
f5506ffbf34168afb8dc1d12d08a38fc
-
SHA1
4062954622406a6e29c52d31dea192c79f7fe7bf
-
SHA256
018c780a107fe4c716e1f20814f821bee4571f2059b8efed53fafe31cea3d671
-
SHA512
e455aa92a43b0946945ee22d93b50ed9dcd7dc0c2f0e02132d4bcb1c0b67c90a132c7372f293c2292a925564cbc44050fa4830934aeb4422147905a2462716ed
-
SSDEEP
1536:K1KTRyrsnRpBgO7JL+97UCnDCZI31QocZaROflkfe970KqwGzlbP3BEA89wtHc:K1U4whj67KqH5bP8B
Static task
static1
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win7-20240508-en
Malware Config
Extracted
xworm
5.0
san-periods.gl.at.ply.gg:45994
1BUzRXFjTnB3BgEr
-
Install_directory
%AppData%
-
install_file
svvhost.exe
Targets
-
-
Target
Dropper.exe
-
Size
130KB
-
MD5
f5506ffbf34168afb8dc1d12d08a38fc
-
SHA1
4062954622406a6e29c52d31dea192c79f7fe7bf
-
SHA256
018c780a107fe4c716e1f20814f821bee4571f2059b8efed53fafe31cea3d671
-
SHA512
e455aa92a43b0946945ee22d93b50ed9dcd7dc0c2f0e02132d4bcb1c0b67c90a132c7372f293c2292a925564cbc44050fa4830934aeb4422147905a2462716ed
-
SSDEEP
1536:K1KTRyrsnRpBgO7JL+97UCnDCZI31QocZaROflkfe970KqwGzlbP3BEA89wtHc:K1U4whj67KqH5bP8B
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1