General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
-
Size
551KB
-
Sample
240710-ak16rawfrc
-
MD5
e30e2fe91be631b7bb50916d7b521c29
-
SHA1
7174d5827f6a97e102ed84dc4083a535eb101dc3
-
SHA256
5251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3
-
SHA512
9ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece
-
SSDEEP
12288:/B7jZhysUp6eR1QBNHDt11EpWrcKIx6AB/PX6BPLAzibNv0dY:/xZETp6eoNHDt1mmbroPX6BLoihv0C
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
3.1
rwanco.duckdns.org:1515
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
-
Size
551KB
-
MD5
e30e2fe91be631b7bb50916d7b521c29
-
SHA1
7174d5827f6a97e102ed84dc4083a535eb101dc3
-
SHA256
5251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3
-
SHA512
9ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece
-
SSDEEP
12288:/B7jZhysUp6eR1QBNHDt11EpWrcKIx6AB/PX6BPLAzibNv0dY:/xZETp6eoNHDt1mmbroPX6BLoihv0C
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1