Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 18:48

General

  • Target

    .netframework4.1.1.exe

  • Size

    35KB

  • MD5

    06cd4891e0196388ed804a8d138da64c

  • SHA1

    d2ab89cec928c536cc748795aa2683e452e9f0a2

  • SHA256

    c625094a95eef5285aede457763382e9d56f1ae02eebe6c6ca123aeff6fa069b

  • SHA512

    054d49b00197487772a29516d2d29e6c113e2468acb918351398edf4ad2d87c7e26ec6c10923813ca99dfe7b92327a5a76ddcdb35ca65994298961740bf35803

  • SSDEEP

    768:ldvNjTsiPrGiB7Fyva4VFyv9e6Ojhym3:ldaOf7SaGFY9e6OjH

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.1.109:7000

Mutex

J5mD3hKJ09FsHfoz

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\.netframework4.1.1.exe
    "C:\Users\Admin\AppData\Local\Temp\.netframework4.1.1.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/988-0-0x00007FF844513000-0x00007FF844515000-memory.dmp

    Filesize

    8KB

  • memory/988-1-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/988-5-0x00007FF844510000-0x00007FF844FD1000-memory.dmp

    Filesize

    10.8MB

  • memory/988-6-0x00007FF844513000-0x00007FF844515000-memory.dmp

    Filesize

    8KB

  • memory/988-7-0x00007FF844510000-0x00007FF844FD1000-memory.dmp

    Filesize

    10.8MB