General

  • Target

    Security0.exe

  • Size

    10.3MB

  • Sample

    240723-w3rwpavfka

  • MD5

    9f5720e13e66729b1e685917c46dd186

  • SHA1

    28593c013c1508dab2e1238fb4bfad88a5f9b619

  • SHA256

    e982016c5ee91104814d98c4fa3f8afbfa21dc7533133e09d7e50e6f64984fc5

  • SHA512

    ec2b173db12db307a5af11753b528d4bfd27ec1997c5425b866d4dd27960c6878c75ccd5e0d7eaaa83071aae79659aca462e4720c3b372b530e5d196ab453da5

  • SSDEEP

    196608:7GIfbVgEplBHgsX7NTlsSe/HEC+q1gkY4uHnaKjNQh4aj:dbVNAavsS0krq3116N64a

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7787

92.43.187.26:7787

Attributes
  • Install_directory

    %Temp%

  • install_file

    WindowsSecurity.exe

Targets

    • Target

      Security0.exe

    • Size

      10.3MB

    • MD5

      9f5720e13e66729b1e685917c46dd186

    • SHA1

      28593c013c1508dab2e1238fb4bfad88a5f9b619

    • SHA256

      e982016c5ee91104814d98c4fa3f8afbfa21dc7533133e09d7e50e6f64984fc5

    • SHA512

      ec2b173db12db307a5af11753b528d4bfd27ec1997c5425b866d4dd27960c6878c75ccd5e0d7eaaa83071aae79659aca462e4720c3b372b530e5d196ab453da5

    • SSDEEP

      196608:7GIfbVgEplBHgsX7NTlsSe/HEC+q1gkY4uHnaKjNQh4aj:dbVNAavsS0krq3116N64a

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks