Analysis
-
max time kernel
12s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
XWorm V5.4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
XWorm V5.4.exe
Resource
win10v2004-20240802-en
General
-
Target
XWorm V5.4.exe
-
Size
136KB
-
MD5
7777356c70b6cfe98efcb0c2ec2a58d5
-
SHA1
84c92c257c0ca88481be3d3e05064b89a265a571
-
SHA256
c4f4cc66ba639e26c23684103c5f3d229bcbf19a005e572d79f157fca9500859
-
SHA512
872fbdc59034cc2fb0d1521f2c2ee891e205b992d72fd91bfd56531014edf3c31d0ae121e1b40fc37e8ba21c4170af3f3f5d500c466a9ea150392aa037825a6d
-
SSDEEP
1536:nxkAni0GTlyywlA/tX5AJ4bQoFr5e1wUvaFYtZxdyQ2U:xkAn8TlyyzWmbQoFr5B07byQR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation XWorm V5.4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm V5.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1224 4948 XWorm V5.4.exe 84 PID 4948 wrote to memory of 1224 4948 XWorm V5.4.exe 84 PID 4948 wrote to memory of 1224 4948 XWorm V5.4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.4.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\i6.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74