General
-
Target
svchost.exe
-
Size
90KB
-
Sample
240915-vpdlgavckj
-
MD5
8f535a06fc7c41dcef821b0459066961
-
SHA1
279430ac0656ca0863aea9e02e47bd1988fa63c1
-
SHA256
acd88b193946ae308f578a08a3426bf6d162f6af6f01401ba264b01e732bbddc
-
SHA512
0ffe370fe384b4a7dc3b8003f7d9e7a5901bb9cf7d3524852db3dbad3b8dc0f3ec3de9a0787db72d79c2ded1166e8ea3b8772e0841e776793ecc2996b3aa729f
-
SSDEEP
1536:2BveucywHzpDOGugyUGlFCxdGqPKlbuQbcfhE50T6UiLlOBDf1vJJF82jik:kvcySpDImxalbuVhE9lOVf1vbh
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
147.185.221.22:46682
127.0.0.1:46682
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7460424057:AAFqb7sl9YoUjtnfCXABy_ETYSrIdrvDNo8/sendMessage?chat_id=7309152263
Extracted
gurcu
https://api.telegram.org/bot7460424057:AAFqb7sl9YoUjtnfCXABy_ETYSrIdrvDNo8/sendMessage?chat_id=7309152263
Targets
-
-
Target
svchost.exe
-
Size
90KB
-
MD5
8f535a06fc7c41dcef821b0459066961
-
SHA1
279430ac0656ca0863aea9e02e47bd1988fa63c1
-
SHA256
acd88b193946ae308f578a08a3426bf6d162f6af6f01401ba264b01e732bbddc
-
SHA512
0ffe370fe384b4a7dc3b8003f7d9e7a5901bb9cf7d3524852db3dbad3b8dc0f3ec3de9a0787db72d79c2ded1166e8ea3b8772e0841e776793ecc2996b3aa729f
-
SSDEEP
1536:2BveucywHzpDOGugyUGlFCxdGqPKlbuQbcfhE50T6UiLlOBDf1vJJF82jik:kvcySpDImxalbuVhE9lOVf1vbh
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4