General
-
Target
Security0.exe
-
Size
10.3MB
-
Sample
240723-w3rwpavfka
-
MD5
9f5720e13e66729b1e685917c46dd186
-
SHA1
28593c013c1508dab2e1238fb4bfad88a5f9b619
-
SHA256
e982016c5ee91104814d98c4fa3f8afbfa21dc7533133e09d7e50e6f64984fc5
-
SHA512
ec2b173db12db307a5af11753b528d4bfd27ec1997c5425b866d4dd27960c6878c75ccd5e0d7eaaa83071aae79659aca462e4720c3b372b530e5d196ab453da5
-
SSDEEP
196608:7GIfbVgEplBHgsX7NTlsSe/HEC+q1gkY4uHnaKjNQh4aj:dbVNAavsS0krq3116N64a
Behavioral task
behavioral1
Sample
Security0.exe
Resource
win10-20240611-en
Malware Config
Extracted
xworm
127.0.0.1:7787
92.43.187.26:7787
-
Install_directory
%Temp%
-
install_file
WindowsSecurity.exe
Targets
-
-
Target
Security0.exe
-
Size
10.3MB
-
MD5
9f5720e13e66729b1e685917c46dd186
-
SHA1
28593c013c1508dab2e1238fb4bfad88a5f9b619
-
SHA256
e982016c5ee91104814d98c4fa3f8afbfa21dc7533133e09d7e50e6f64984fc5
-
SHA512
ec2b173db12db307a5af11753b528d4bfd27ec1997c5425b866d4dd27960c6878c75ccd5e0d7eaaa83071aae79659aca462e4720c3b372b530e5d196ab453da5
-
SSDEEP
196608:7GIfbVgEplBHgsX7NTlsSe/HEC+q1gkY4uHnaKjNQh4aj:dbVNAavsS0krq3116N64a
-
Detect Xworm Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1