Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 15:47
Behavioral task
behavioral1
Sample
XWorm V5.6.7z
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
XWorm V5.6.7z
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
XWorm V5.6.7z
-
Size
18.5MB
-
MD5
8b6bc1d51fabdf54d2bf97d5d80ce963
-
SHA1
8e4595e0bc0c29177ccd590aab430ef1734e88a5
-
SHA256
9ea90c73eb93f4d3fadc8f35e0200c72d3f0573d454a8a82b4a6f9407d176d44
-
SHA512
c1cd937c6d0d50370e64fe453f51ca194ac46684cfd0b0ae49dd9c494f20058d57058535a2c372a9cc8ec7310f70d4285462d44243dbd245f224da1cb33f1aba
-
SSDEEP
393216:1JDFgNmFH7nwXDx8MiiTpzHuxWAk42uShm0ULvcPMWDMJF:1ZFgNqH7c1FbGWAX0cKMWov
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1704 3004 cmd.exe 31 PID 3004 wrote to memory of 1704 3004 cmd.exe 31 PID 3004 wrote to memory of 1704 3004 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1704
-