General
-
Target
HWID Spoofer Free 2024.exe
-
Size
260KB
-
Sample
240627-k29jkawclm
-
MD5
9c01f25760bb62f4b63185a483332626
-
SHA1
d0a71eba30f35492a7977c509d9361bde7a09409
-
SHA256
d940565d0508025bf84d9a87d9ed6e223e60a473abcb972eb65d0b94c5428f9c
-
SHA512
198464802cb8492fc191c47a0150c646af5b62d8d0a55e9895d64ccebcbffd2b96e9b268dfd76bdf951fe4112e7a4e0d516bb6c4d49904a479c3cf610f1c1303
-
SSDEEP
6144:3TeTVJYOz8inVydSciujP7AbaniTuS7gaEpl0T81/1Whx:jeTVJYOBVyYciujP7AbanLkql481/1
Static task
static1
Malware Config
Extracted
xworm
45.141.26.194:7000
-
Install_directory
%Temp%
Targets
-
-
Target
HWID Spoofer Free 2024.exe
-
Size
260KB
-
MD5
9c01f25760bb62f4b63185a483332626
-
SHA1
d0a71eba30f35492a7977c509d9361bde7a09409
-
SHA256
d940565d0508025bf84d9a87d9ed6e223e60a473abcb972eb65d0b94c5428f9c
-
SHA512
198464802cb8492fc191c47a0150c646af5b62d8d0a55e9895d64ccebcbffd2b96e9b268dfd76bdf951fe4112e7a4e0d516bb6c4d49904a479c3cf610f1c1303
-
SSDEEP
6144:3TeTVJYOz8inVydSciujP7AbaniTuS7gaEpl0T81/1Whx:jeTVJYOBVyYciujP7AbanLkql481/1
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1