Overview
overview
10Static
static
10XWorm v5.6...0r.zip
windows10-2004-x64
5XWorm v5.6...IP.dat
windows10-2004-x64
1XWorm v5.6...1).ico
windows10-2004-x64
1XWorm v5.6...0).ico
windows10-2004-x64
1XWorm v5.6...1).ico
windows10-2004-x64
1XWorm v5.6...2).ico
windows10-2004-x64
1XWorm v5.6...3).ico
windows10-2004-x64
1XWorm v5.6...4).ico
windows10-2004-x64
1XWorm v5.6...5).ico
windows10-2004-x64
1XWorm v5.6...6).ico
windows10-2004-x64
1XWorm v5.6...7).ico
windows10-2004-x64
1XWorm v5.6...2).ico
windows10-2004-x64
1XWorm v5.6...3).ico
windows10-2004-x64
1XWorm v5.6...4).ico
windows10-2004-x64
1XWorm v5.6...5).ico
windows10-2004-x64
1XWorm v5.6...6).ico
windows10-2004-x64
1XWorm v5.6...7).ico
windows10-2004-x64
1XWorm v5.6...8).ico
windows10-2004-x64
1XWorm v5.6...9).ico
windows10-2004-x64
1XWorm v5.6...gs.txt
windows10-2004-x64
1XWorm v5.6...io.dll
windows10-2004-x64
1XWorm v5.6...on.dll
windows10-2004-x64
1XWorm v5.6...ws.dll
windows10-2004-x64
1XWorm v5.6...at.dll
windows10-2004-x64
1XWorm v5.6...um.dll
windows10-2004-x64
1XWorm v5.6...rd.dll
windows10-2004-x64
1XWorm v5.6...ss.dll
windows10-2004-x64
1XWorm v5.6...er.dll
windows10-2004-x64
1XWorm v5.6...er.dll
windows10-2004-x64
1XWorm v5.6...er.dll
windows10-2004-x64
1XWorm v5.6...at.wav
windows10-2004-x64
6XWorm v5.6...ro.wav
windows10-2004-x64
6Resubmissions
08-08-2024 19:37
240808-ybxnzayblk 10Analysis
-
max time kernel
272s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 19:37
Behavioral task
behavioral1
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/GeoIP.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (1).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (10).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (11).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (12).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (13).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (14).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (15).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (16).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (17).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (2).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (3).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (4).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (5).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (6).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (7).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (8).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Icons/icon (9).ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Logs/ErrorLogs.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/NAudio.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/ActiveWindows.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/Chat.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/Chromium.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/Clipboard.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/FileManager.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/FilesSearcher.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Plugins/HBrowser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Sounds/Chat.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
XWorm v5.6 Edition Cracked By @Drcrypt0r/Sounds/Intro.wav
Resource
win10v2004-20240802-en
General
-
Target
XWorm v5.6 Edition Cracked By @Drcrypt0r/Sounds/Intro.wav
-
Size
238KB
-
MD5
ad3b4fae17bcabc254df49f5e76b87a6
-
SHA1
1683ff029eebaffdc7a4827827da7bb361c8747e
-
SHA256
e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
-
SHA512
3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
SSDEEP
3072:FU3hYG9X9JzhaLL5+QYKHZDa6D+4LT92KEpcP+b8FGUt0Ybs5e9jXjubLtNmBNs9:GjVsLL5lva6D+4P9llWvaGe9CHeBNm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
Processes:
wmplayer.exedescription ioc process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
wmplayer.exeunregmp2.exedescription ioc process File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmplayer.exeunregmp2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
Processes:
wmplayer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{48B4954A-C3E2-4769-B3F6-9E2AE600AF88} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
wmplayer.exeunregmp2.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1400 wmplayer.exe Token: SeCreatePagefilePrivilege 1400 wmplayer.exe Token: SeShutdownPrivilege 1556 unregmp2.exe Token: SeCreatePagefilePrivilege 1556 unregmp2.exe Token: 33 3972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3972 AUDIODG.EXE Token: SeShutdownPrivilege 1400 wmplayer.exe Token: SeCreatePagefilePrivilege 1400 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wmplayer.exepid process 1400 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
wmplayer.exeunregmp2.exedescription pid process target process PID 1400 wrote to memory of 376 1400 wmplayer.exe unregmp2.exe PID 1400 wrote to memory of 376 1400 wmplayer.exe unregmp2.exe PID 1400 wrote to memory of 376 1400 wmplayer.exe unregmp2.exe PID 376 wrote to memory of 1556 376 unregmp2.exe unregmp2.exe PID 376 wrote to memory of 1556 376 unregmp2.exe unregmp2.exe
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm v5.6 Edition Cracked By @Drcrypt0r\Sounds\Intro.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD58ec692343872f4eaf8cfee54f929e23e
SHA19c76e4f80a1d73069c6ea86c847e9804d0099ada
SHA256440bff28f08e486b5b6fc3fa5f3d57df1ea81ee353708c4f5cb0a243684f4940
SHA51234c22bdb5404eb420b07d0180609e1442e2668b83be304ef8e757e9362af3b4def60dbda068b6a32d34ee047f3392efcd358d691a14035240e6e9c81d98a6f0e
-
Filesize
68KB
MD59e42db252f9788b6a1bb9d6d6a6b2143
SHA1eb5837bd5cda4aaa55ff6c079e1c6409c7399522
SHA256022b43cce5ed1a022fbf1507b82d0fa1f38a146f9452e45c4a6243dab9348e93
SHA512e4d062a316e19e6ceb73db5ae347d7ea013c3258e23fb2928cdfb4928d3d67bc2c945426fe784d1ec8fac269b019f53ec07a048085aaaa899cd2845dd6c4d879
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD52057dfab95452bc568188f08dacfd76d
SHA1c19106bca30b0ce58d804d620592c4c806003141
SHA2567eaae7d823ab580ce3a34c547f46c5b52896e4a6eed49dd6b868365eaf5d0fc6
SHA512a08deb795db84474853f3d6ef14b40ae7e2b899b9070a271a1f399023994c1de36d165cf5351b2cdfecf322ed14f906b9cb4670ee3e90005feb2bca56d5acb5e