Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-05-2024 22:12
Behavioral task
behavioral1
Sample
XWorm/XWorm V5.2/XWorm V5.2.exe
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
XWorm/XWorm V5.2/XWormLoader 5.2 x64.exe
Resource
win11-20240426-en
General
-
Target
XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe
-
Size
109KB
-
MD5
f3b2ec58b71ba6793adcc2729e2140b1
-
SHA1
d9e93a33ac617afe326421df4f05882a61e0a4f2
-
SHA256
2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae
-
SHA512
473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495
-
SSDEEP
1536:5vjAnXqn2nY7WfRMgPQQrMoqmyVttdGFQeOPigx:5LCan2nY7sdQQAoqmyBeu
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2148-32-0x000000000C4F0000-0x000000000C6E4000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
Processes:
XWormLoader 5.2 x32.exepid process 2148 XWormLoader 5.2 x32.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/2148-18-0x00000000069D0000-0x0000000007608000-memory.dmp agile_net -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
XWormLoader 5.2 x32.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz XWormLoader 5.2 x32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
XWormLoader 5.2 x32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x32.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
XWormLoader 5.2 x32.exepid process 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
XWormLoader 5.2 x32.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2148 XWormLoader 5.2 x32.exe Token: 33 4596 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4596 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
XWormLoader 5.2 x32.exepid process 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
XWormLoader 5.2 x32.exepid process 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe 2148 XWormLoader 5.2 x32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aPjMR\aPjMR.dllFilesize
84KB
MD50b0e63957367e620b8697c5341af35b9
SHA169361c2762b2d1cada80667cd55bc5082e60af86
SHA256bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5
SHA51207d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee
-
memory/2148-18-0x00000000069D0000-0x0000000007608000-memory.dmpFilesize
12.2MB
-
memory/2148-37-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-3-0x0000000005AA0000-0x0000000005B3C000-memory.dmpFilesize
624KB
-
memory/2148-4-0x0000000005A10000-0x0000000005A38000-memory.dmpFilesize
160KB
-
memory/2148-5-0x00000000059E0000-0x00000000059E6000-memory.dmpFilesize
24KB
-
memory/2148-6-0x0000000005B40000-0x0000000005B9E000-memory.dmpFilesize
376KB
-
memory/2148-19-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-8-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-9-0x0000000005C00000-0x0000000005C06000-memory.dmpFilesize
24KB
-
memory/2148-10-0x0000000005C40000-0x0000000005C46000-memory.dmpFilesize
24KB
-
memory/2148-11-0x0000000005CC0000-0x0000000005CFC000-memory.dmpFilesize
240KB
-
memory/2148-12-0x0000000005D40000-0x0000000005D5A000-memory.dmpFilesize
104KB
-
memory/2148-13-0x0000000005CB0000-0x0000000005CC0000-memory.dmpFilesize
64KB
-
memory/2148-16-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-39-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-2-0x00000000055E0000-0x0000000005622000-memory.dmpFilesize
264KB
-
memory/2148-7-0x0000000005BA0000-0x0000000005BF6000-memory.dmpFilesize
344KB
-
memory/2148-20-0x0000000007610000-0x0000000007BB6000-memory.dmpFilesize
5.6MB
-
memory/2148-21-0x00000000060F0000-0x0000000006182000-memory.dmpFilesize
584KB
-
memory/2148-1-0x00000000004F0000-0x0000000000510000-memory.dmpFilesize
128KB
-
memory/2148-28-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-29-0x000000000AF00000-0x000000000BAEC000-memory.dmpFilesize
11.9MB
-
memory/2148-30-0x00000000030C0000-0x00000000030CA000-memory.dmpFilesize
40KB
-
memory/2148-31-0x00000000067F0000-0x0000000006846000-memory.dmpFilesize
344KB
-
memory/2148-32-0x000000000C4F0000-0x000000000C6E4000-memory.dmpFilesize
2.0MB
-
memory/2148-33-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-34-0x000000000ED90000-0x000000000EDF6000-memory.dmpFilesize
408KB
-
memory/2148-35-0x000000007491E000-0x000000007491F000-memory.dmpFilesize
4KB
-
memory/2148-36-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-0-0x000000007491E000-0x000000007491F000-memory.dmpFilesize
4KB
-
memory/2148-38-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB
-
memory/2148-17-0x0000000074910000-0x00000000750C1000-memory.dmpFilesize
7.7MB