Analysis

  • max time kernel
    76s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 22:25

General

  • Target

    XWorm V5.2.exe

  • Size

    33.3MB

  • MD5

    1c2cd073a230901a06156aaa52937873

  • SHA1

    93230345a666090adbb49316a0e77d8f97c4f5f1

  • SHA256

    44437ef0c2d0c343704559ffdad6ca996abd284b3f6fb1e87497febb5b29fffc

  • SHA512

    d5e0cc9d5bca2318104b531ed9fed9dce7c0a96758b697273909b30d8ff7849a02de767a20ddbac993e653a2f8ef56769664f6841957c2884f5bb07695da85c8

  • SSDEEP

    786432:ffvzciPWoAfmxXowcP/2WKq/kqrsDGY3B0AE//3loS:/zce6xjsqrsDnGlb

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:696
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1756
    • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x64.exe
      "C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x64.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4656
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4868
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x4f8 0x2fc
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1812

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

        Filesize

        112KB

        MD5

        2f1a50031dcf5c87d92e8b2491fdcea6

        SHA1

        71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

        SHA256

        47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

        SHA512

        1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

      • C:\Users\Admin\Desktop\XWorm V5.2\GeoIP.dat

        Filesize

        1.2MB

        MD5

        8ef41798df108ce9bd41382c9721b1c9

        SHA1

        1e6227635a12039f4d380531b032bf773f0e6de0

        SHA256

        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

        SHA512

        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

      • C:\Users\Admin\Desktop\XWorm V5.2\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        bcc0fe2b28edd2da651388f84599059b

        SHA1

        44d7756708aafa08730ca9dbdc01091790940a4f

        SHA256

        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

        SHA512

        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

      • C:\Users\Admin\Desktop\XWorm V5.2\Icons\icon (15).ico

        Filesize

        361KB

        MD5

        e3143e8c70427a56dac73a808cba0c79

        SHA1

        63556c7ad9e778d5bd9092f834b5cc751e419d16

        SHA256

        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

        SHA512

        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

      • C:\Users\Admin\Desktop\XWorm V5.2\Mono.Cecil.dll

        Filesize

        350KB

        MD5

        de69bb29d6a9dfb615a90df3580d63b1

        SHA1

        74446b4dcc146ce61e5216bf7efac186adf7849b

        SHA256

        f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

        SHA512

        6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Backports.dll

        Filesize

        138KB

        MD5

        dd43356f07fc0ce082db4e2f102747a2

        SHA1

        aa0782732e2d60fa668b0aadbf3447ef70b6a619

        SHA256

        e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

        SHA512

        284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Core.dll

        Filesize

        216KB

        MD5

        b808181453b17f3fc1ab153bf11be197

        SHA1

        bce86080b7eb76783940d1ff277e2b46f231efe9

        SHA256

        da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

        SHA512

        a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.ILHelpers.dll

        Filesize

        6KB

        MD5

        6512e89e0cb92514ef24be43f0bf4500

        SHA1

        a039c51f89656d9d5c584f063b2b675a9ff44b8e

        SHA256

        1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

        SHA512

        9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Utils.dll

        Filesize

        319KB

        MD5

        79f1c4c312fdbb9258c2cdde3772271f

        SHA1

        a143434883e4ef2c0190407602b030f5c4fdf96f

        SHA256

        f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

        SHA512

        b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

      • C:\Users\Admin\Desktop\XWorm V5.2\RVGLib.dll

        Filesize

        241KB

        MD5

        d34c13128c6c7c93af2000a45196df81

        SHA1

        664c821c9d2ed234aea31d8b4f17d987e4b386f1

        SHA256

        aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

        SHA512

        91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

      • C:\Users\Admin\Desktop\XWorm V5.2\Sounds\Intro.wav

        Filesize

        238KB

        MD5

        ad3b4fae17bcabc254df49f5e76b87a6

        SHA1

        1683ff029eebaffdc7a4827827da7bb361c8747e

        SHA256

        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

        SHA512

        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

      • C:\Users\Admin\Desktop\XWorm V5.2\XWorm V5.2.exe

        Filesize

        12.2MB

        MD5

        8b7b015c1ea809f5c6ade7269bdc5610

        SHA1

        c67d5d83ca18731d17f79529cfdb3d3dcad36b96

        SHA256

        7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

        SHA512

        e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

      • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x64.exe

        Filesize

        109KB

        MD5

        e6a20535b636d6402164a8e2d871ef6d

        SHA1

        981cb1fd9361ca58f8985104e00132d1836a8736

        SHA256

        b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

        SHA512

        35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

      • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x64.exe.config

        Filesize

        187B

        MD5

        15c8c4ba1aa574c0c00fd45bb9cce1ab

        SHA1

        0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

        SHA256

        f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

        SHA512

        52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

      • memory/4656-216-0x00000192CFD80000-0x00000192CFD9A000-memory.dmp

        Filesize

        104KB

      • memory/4656-229-0x00000192EA7A0000-0x00000192EB38C000-memory.dmp

        Filesize

        11.9MB

      • memory/4656-212-0x00000192CE380000-0x00000192CE386000-memory.dmp

        Filesize

        24KB

      • memory/4656-213-0x00000192CE390000-0x00000192CE396000-memory.dmp

        Filesize

        24KB

      • memory/4656-210-0x00000192E86C0000-0x00000192E8716000-memory.dmp

        Filesize

        344KB

      • memory/4656-215-0x00000192E85E0000-0x00000192E861C000-memory.dmp

        Filesize

        240KB

      • memory/4656-208-0x00000192E8640000-0x00000192E869E000-memory.dmp

        Filesize

        376KB

      • memory/4656-206-0x00000192CE400000-0x00000192CE406000-memory.dmp

        Filesize

        24KB

      • memory/4656-218-0x00000192E9360000-0x00000192E9F98000-memory.dmp

        Filesize

        12.2MB

      • memory/4656-219-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-204-0x00000192CFD30000-0x00000192CFD58000-memory.dmp

        Filesize

        160KB

      • memory/4656-227-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-228-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-211-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-202-0x00000192CE3B0000-0x00000192CE3F2000-memory.dmp

        Filesize

        264KB

      • memory/4656-231-0x00000192E9080000-0x00000192E9274000-memory.dmp

        Filesize

        2.0MB

      • memory/4656-232-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-233-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-234-0x00007FFD4C4C3000-0x00007FFD4C4C5000-memory.dmp

        Filesize

        8KB

      • memory/4656-200-0x0000000000550000-0x0000000000570000-memory.dmp

        Filesize

        128KB

      • memory/4656-236-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-237-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-238-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-239-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-199-0x00007FFD4C4C3000-0x00007FFD4C4C5000-memory.dmp

        Filesize

        8KB

      • memory/4656-241-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-242-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB

      • memory/4656-244-0x00007FFD4C4C0000-0x00007FFD4CF81000-memory.dmp

        Filesize

        10.8MB