Analysis
-
max time kernel
60s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 10:06
Behavioral task
behavioral1
Sample
XWorm V5.2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XWorm V5.2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
XWormLoader 5.2 x32.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
XWormLoader 5.2 x32.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
XWormLoader 5.2 x64.exe
Resource
win7-20240704-en
General
-
Target
XWormLoader 5.2 x32.exe
-
Size
109KB
-
MD5
f3b2ec58b71ba6793adcc2729e2140b1
-
SHA1
d9e93a33ac617afe326421df4f05882a61e0a4f2
-
SHA256
2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae
-
SHA512
473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495
-
SSDEEP
1536:5vjAnXqn2nY7WfRMgPQQrMoqmyVttdGFQeOPigx:5LCan2nY7sdQQAoqmyBeu
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral4/memory/3824-32-0x000000000B9D0000-0x000000000BBC4000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
pid Process 3824 XWormLoader 5.2 x32.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral4/memory/3824-18-0x0000000005EB0000-0x0000000006AE8000-memory.dmp agile_net -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz XWormLoader 5.2 x32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x32.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe 3824 XWormLoader 5.2 x32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3824 XWormLoader 5.2 x32.exe Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3824 XWormLoader 5.2 x32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3824 XWormLoader 5.2 x32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWormLoader 5.2 x32.exe"C:\Users\Admin\AppData\Local\Temp\XWormLoader 5.2 x32.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3824
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3672
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x328 0x2d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD50b0e63957367e620b8697c5341af35b9
SHA169361c2762b2d1cada80667cd55bc5082e60af86
SHA256bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5
SHA51207d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee