Overview
overview
10Static
static
3XWorm.rar
windows10-2004-x64
3ComponentF...it.dll
windows10-2004-x64
1ComponentF...it.pdb
windows10-2004-x64
3D3DX9_43.dll
windows10-2004-x64
1Krypton.Toolkit.dll
windows10-2004-x64
1Mono.Cecil.dll
windows10-2004-x64
1Mono.Nat.dll
windows10-2004-x64
1VMProtectSDK64.lib
windows10-2004-x64
3Vestris.Re...ib.dll
windows10-2004-x64
1XWorm.xml
windows10-2004-x64
1XWorm.exe
windows10-2004-x64
10imgui.ini
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31/07/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
XWorm.rar
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
ComponentFactory.Krypton.Toolkit.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
ComponentFactory.Krypton.Toolkit.pdb
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
D3DX9_43.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
Krypton.Toolkit.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral6
Sample
Mono.Cecil.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
Mono.Nat.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral8
Sample
VMProtectSDK64.lib
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral10
Sample
XWorm.xml
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
XWorm.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral12
Sample
imgui.ini
Resource
win10v2004-20240730-en
General
-
Target
XWorm.rar
-
Size
3.8MB
-
MD5
72ed99d6168329b94021eaf282af0552
-
SHA1
0be0ad479efa7b5d3021b06ab5f6b71f858ba08f
-
SHA256
463eb31b863993ffc7ebd1e67a593c0fc01bfcef367a988191926facfb93d93a
-
SHA512
b11c5657389e8e6f5af5bdbef2b22daef62e26484117c9a30de184a63980e6108cd804e43db7494f24057eaeec32ced7ab5ebd6f7aedb6467a207a209a2bd2a7
-
SSDEEP
98304:AdRaDzmLW/nQDItjvhd8cMOBmYS1svAJFFa6XmeuwSqUjGMtokcqh:AAearjJd8vNYNQFzEvBVtoFqh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 OpenWith.exe -
Suspicious use of SetWindowsHookEx 61 IoCs
pid Process 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe 2988 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\XWorm.rar1⤵
- Modifies registry class
PID:708
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2988
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3152