General
-
Target
notepadd (3).exe
-
Size
7.4MB
-
Sample
240821-nvzmkazfkm
-
MD5
c694c8301947af8b5c65e6132581044b
-
SHA1
d1c7cbb77eff86db70df4feae1c2a849fb695b65
-
SHA256
0e18f1cd01243a43de369982b88a586b585f2dc34f0c8a942f54f21069e5c71c
-
SHA512
babe000cade9afcc76cf41b0bd064c0124d5a97ff4e3e52024e25ad39fe8f9f26ac3a4027f4194d19ead2a502df4dbc916f1b2f870a14d4a2ae28a3115804775
-
SSDEEP
196608:1mcUG4raKu24YY7HVT4hV0AD6QgqKRgX:CmKr4YYH+EUWpgX
Behavioral task
behavioral1
Sample
notepadd (3).exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
5.0
88.0.183.177:1603
88.0.172.65:1603
83.36.190.196:1603
83.38.30.219:1603
XpRJMNcN9dWrZEo0
-
Install_directory
%ProgramData%
-
install_file
RuntimeBroker.exe
Extracted
xworm
88.0.183.177:1603
88.0.172.65:1603
83.36.190.196:1603
83.38.30.219:1603
-
Install_directory
%Temp%
-
install_file
SecurityHealthSystray.exe
Targets
-
-
Target
notepadd (3).exe
-
Size
7.4MB
-
MD5
c694c8301947af8b5c65e6132581044b
-
SHA1
d1c7cbb77eff86db70df4feae1c2a849fb695b65
-
SHA256
0e18f1cd01243a43de369982b88a586b585f2dc34f0c8a942f54f21069e5c71c
-
SHA512
babe000cade9afcc76cf41b0bd064c0124d5a97ff4e3e52024e25ad39fe8f9f26ac3a4027f4194d19ead2a502df4dbc916f1b2f870a14d4a2ae28a3115804775
-
SSDEEP
196608:1mcUG4raKu24YY7HVT4hV0AD6QgqKRgX:CmKr4YYH+EUWpgX
-
Detect Xworm Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1