Analysis
-
max time kernel
1690s -
max time network
1164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-de -
resource tags
arch:x64arch:x86image:win10v2004-20240730-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
02/08/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win7-20240708-de
Behavioral task
behavioral2
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20240730-de
Behavioral task
behavioral3
Sample
XWorm-5.6-main/README.md
Resource
win7-20240708-de
Behavioral task
behavioral4
Sample
XWorm-5.6-main/README.md
Resource
win10v2004-20240730-de
Behavioral task
behavioral5
Sample
XWorm-5.6-main/r3adm3.txt
Resource
win7-20240704-de
Behavioral task
behavioral6
Sample
XWorm-5.6-main/r3adm3.txt
Resource
win10v2004-20240730-de
General
-
Target
XWorm-5.6-main/README.md
-
Size
981B
-
MD5
f5ba92955efe3119624dd8599f3c2220
-
SHA1
12208614f0c6235f222521d80f387ffcc14399f1
-
SHA256
d42574b91e2266755cc594bc657c38cb7fdf897649db11da3878d581e88cb62a
-
SHA512
28ed8b46e9eac1d93795db10ac819bec12ddec87b3fb7c7908d1fb9fb8fe260a587472c721b6121948b1102df7ec403f4202c9eafbde7d6fd6e23fbe72fd571a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4608 OpenWith.exe