Malware Analysis Report

2024-09-23 01:11

Sample ID 240516-14wngsba73
Target XWorm v5.1-5.2.7z
SHA256 fe6371034d55bb7583081b03f4aec7274f8340cfea4740325cb52e1c6ac77f6d
Tags
agilenet agenttesla stormkitty keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fe6371034d55bb7583081b03f4aec7274f8340cfea4740325cb52e1c6ac77f6d

Threat Level: Known bad

The file XWorm v5.1-5.2.7z was found to be: Known bad.

Malicious Activity Summary

agilenet agenttesla stormkitty keylogger spyware stealer trojan

Stormkitty family

Agenttesla family

Contains code to disable Windows Defender

StormKitty payload

AgentTesla

AgentTesla payload

AgentTesla payload

Obfuscated with Agile.Net obfuscator

Loads dropped DLL

Unsigned PE

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-16 22:13

Signatures

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Agenttesla family

agenttesla

Contains code to disable Windows Defender

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

StormKitty payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Stormkitty family

stormkitty

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-16 22:12

Reported

2024-05-16 22:25

Platform

win11-20240426-en

Max time kernel

92s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/4472-0-0x0000000000060000-0x0000000000080000-memory.dmp

memory/4472-1-0x00007FFB24C93000-0x00007FFB24C95000-memory.dmp

memory/4472-2-0x0000026137130000-0x0000026137172000-memory.dmp

memory/4472-3-0x000002614F890000-0x000002614F8B8000-memory.dmp

memory/4472-4-0x00000261371A0000-0x00000261371A6000-memory.dmp

memory/4472-5-0x000002614F920000-0x000002614F97E000-memory.dmp

memory/4472-6-0x000002614FAC0000-0x000002614FB16000-memory.dmp

memory/4472-7-0x00007FFB24C90000-0x00007FFB25752000-memory.dmp

memory/4472-8-0x0000026137000000-0x0000026137006000-memory.dmp

memory/4472-9-0x0000026137180000-0x0000026137186000-memory.dmp

memory/4472-10-0x000002614FB20000-0x000002614FB5C000-memory.dmp

memory/4472-11-0x000002614F8E0000-0x000002614F8FA000-memory.dmp

memory/4472-12-0x00000261507A0000-0x00000261513D8000-memory.dmp

memory/4472-13-0x00007FFB24C90000-0x00007FFB25752000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

MD5 2f1a50031dcf5c87d92e8b2491fdcea6
SHA1 71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA256 47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA512 1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

memory/4472-20-0x00007FFB24C90000-0x00007FFB25752000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 22:12

Reported

2024-05-16 22:23

Platform

win11-20240426-en

Max time kernel

23s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWorm V5.2.exe"

Network

N/A

Files

memory/2108-0-0x00007FFB83433000-0x00007FFB83435000-memory.dmp

memory/2108-1-0x0000021A7A8B0000-0x0000021A7B4E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

MD5 2f1a50031dcf5c87d92e8b2491fdcea6
SHA1 71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA256 47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA512 1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

memory/2108-8-0x00007FFB83430000-0x00007FFB83EF2000-memory.dmp

memory/2108-9-0x0000021A7EA70000-0x0000021A7F65C000-memory.dmp

memory/2108-10-0x0000021A7F860000-0x0000021A7FA54000-memory.dmp

memory/2108-11-0x00007FFB83430000-0x00007FFB83EF2000-memory.dmp

memory/2108-12-0x00007FFB83430000-0x00007FFB83EF2000-memory.dmp

memory/2108-13-0x00007FFB83433000-0x00007FFB83435000-memory.dmp

memory/2108-14-0x00007FFB83430000-0x00007FFB83EF2000-memory.dmp

memory/2108-15-0x00007FFB83430000-0x00007FFB83EF2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 22:12

Reported

2024-05-16 22:26

Platform

win11-20240508-en

Max time kernel

149s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe N/A
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe

"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe"

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C8

Network

Files

memory/2148-0-0x000000007491E000-0x000000007491F000-memory.dmp

memory/2148-1-0x00000000004F0000-0x0000000000510000-memory.dmp

memory/2148-2-0x00000000055E0000-0x0000000005622000-memory.dmp

memory/2148-3-0x0000000005AA0000-0x0000000005B3C000-memory.dmp

memory/2148-4-0x0000000005A10000-0x0000000005A38000-memory.dmp

memory/2148-5-0x00000000059E0000-0x00000000059E6000-memory.dmp

memory/2148-6-0x0000000005B40000-0x0000000005B9E000-memory.dmp

memory/2148-7-0x0000000005BA0000-0x0000000005BF6000-memory.dmp

memory/2148-8-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-9-0x0000000005C00000-0x0000000005C06000-memory.dmp

memory/2148-10-0x0000000005C40000-0x0000000005C46000-memory.dmp

memory/2148-11-0x0000000005CC0000-0x0000000005CFC000-memory.dmp

memory/2148-12-0x0000000005D40000-0x0000000005D5A000-memory.dmp

memory/2148-13-0x0000000005CB0000-0x0000000005CC0000-memory.dmp

memory/2148-16-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-17-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-18-0x00000000069D0000-0x0000000007608000-memory.dmp

memory/2148-19-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-20-0x0000000007610000-0x0000000007BB6000-memory.dmp

memory/2148-21-0x00000000060F0000-0x0000000006182000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\aPjMR\aPjMR.dll

MD5 0b0e63957367e620b8697c5341af35b9
SHA1 69361c2762b2d1cada80667cd55bc5082e60af86
SHA256 bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5
SHA512 07d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee

memory/2148-28-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-29-0x000000000AF00000-0x000000000BAEC000-memory.dmp

memory/2148-30-0x00000000030C0000-0x00000000030CA000-memory.dmp

memory/2148-31-0x00000000067F0000-0x0000000006846000-memory.dmp

memory/2148-32-0x000000000C4F0000-0x000000000C6E4000-memory.dmp

memory/2148-33-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-34-0x000000000ED90000-0x000000000EDF6000-memory.dmp

memory/2148-35-0x000000007491E000-0x000000007491F000-memory.dmp

memory/2148-36-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-37-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-38-0x0000000074910000-0x00000000750C1000-memory.dmp

memory/2148-39-0x0000000074910000-0x00000000750C1000-memory.dmp