Analysis

  • max time kernel
    100s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 03:30

General

  • Target

    XWorm V5.zip

  • Size

    31.4MB

  • MD5

    3415a93b795c772d202d64ed389666ae

  • SHA1

    b5aa030783f74e71dfbf8f16598283e73b688d0a

  • SHA256

    51f2c3e1fd7d5a9a2d9c736c26a85c1870dbefea4254a3697d79aa095cb157f5

  • SHA512

    e67e51ac983b2150010a40dac02a5e2f0f1d7a23502552a2e12538478800b1f4c0ebbed3539c15f32137701d12e189827aa9e1e6c0edd7327dc8102299eaf0f1

  • SSDEEP

    786432:dEDpbLRYIhPp1zfGXUFmq+wjZywUUq/IkCregzvXWIaPQwv9U+Tn:d+pbLRFZfjuUgq+wjbIIkeeg7XRO9U8n

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\XWorm V5.zip"
    1⤵
      PID:4084
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3124
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\Readme.txt
        1⤵
          PID:1776
        • C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\XWormLoader 5.2 x64.exe
          "C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\XWormLoader 5.2 x64.exe"
          1⤵
          • Loads dropped DLL
          • Enumerates system info in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:680
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:440
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x320 0x53c
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:964

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

            Filesize

            112KB

            MD5

            2f1a50031dcf5c87d92e8b2491fdcea6

            SHA1

            71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

            SHA256

            47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

            SHA512

            1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

          • memory/680-6-0x0000016280000000-0x0000016280006000-memory.dmp

            Filesize

            24KB

          • memory/680-2-0x00000162FFE10000-0x00000162FFE38000-memory.dmp

            Filesize

            160KB

          • memory/680-3-0x00000162E7460000-0x00000162E7466000-memory.dmp

            Filesize

            24KB

          • memory/680-4-0x00000162FFF00000-0x00000162FFF5E000-memory.dmp

            Filesize

            376KB

          • memory/680-5-0x00000162FFF60000-0x00000162FFFB6000-memory.dmp

            Filesize

            344KB

          • memory/680-0-0x0000000000EC0000-0x0000000000EE0000-memory.dmp

            Filesize

            128KB

          • memory/680-7-0x0000016280010000-0x0000016280016000-memory.dmp

            Filesize

            24KB

          • memory/680-8-0x00000162FFE80000-0x00000162FFEBC000-memory.dmp

            Filesize

            240KB

          • memory/680-9-0x00000162FFE40000-0x00000162FFE5A000-memory.dmp

            Filesize

            104KB

          • memory/680-10-0x0000016300C40000-0x0000016301878000-memory.dmp

            Filesize

            12.2MB

          • memory/680-1-0x00000162E7470000-0x00000162E74B2000-memory.dmp

            Filesize

            264KB

          • memory/680-18-0x0000016280E40000-0x0000016281A2C000-memory.dmp

            Filesize

            11.9MB

          • memory/680-19-0x0000016300200000-0x00000163003F4000-memory.dmp

            Filesize

            2.0MB