Analysis
-
max time kernel
1793s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 17:15
Behavioral task
behavioral1
Sample
XWorm.V5.2.rar
Resource
win7-20240704-en
windows7-x64
8 signatures
1800 seconds
Behavioral task
behavioral2
Sample
XWorm.V5.2.rar
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
XWorm.V5.2.rar
-
Size
30.4MB
-
MD5
2a16b9474dd55ed48f1602c4a17a3b60
-
SHA1
f279b4a379e4c30e134ccb6a2837dbceecce9d13
-
SHA256
6a4beba8dda5d6d9b9f301c6bcf100b05d8c192453ee7d293efbe95f9a0f76c9
-
SHA512
b2ceeeb17f77c589068259ba07c2c1ccef420af17398f26b6bb92729771c6fb67bcbb2a139243c77dbdfc9dcddcc3e71a805b1645d70afcbbc08b27c7c0881e4
-
SSDEEP
786432:lyWvqS745XHHdXOXZCJxMJW18F3xuuTCXrUGBZ22:PEtn0QJ2g12A7Jr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 2292 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 2292 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe 2292 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2292 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 2812 wrote to memory of 2724 2812 cmd.exe rundll32.exe PID 2812 wrote to memory of 2724 2812 cmd.exe rundll32.exe PID 2812 wrote to memory of 2724 2812 cmd.exe rundll32.exe PID 2724 wrote to memory of 2660 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2660 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2660 2724 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2292 2660 rundll32.exe vlc.exe PID 2660 wrote to memory of 2292 2660 rundll32.exe vlc.exe PID 2660 wrote to memory of 2292 2660 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\XWorm.V5.2.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\XWorm.V5.2.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\XWorm.V5.2.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\XWorm.V5.2.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
-