Analysis
-
max time kernel
100s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 03:30
Behavioral task
behavioral1
Sample
XWorm V5.zip
Resource
win10v2004-20240802-en
General
-
Target
XWorm V5.zip
-
Size
31.4MB
-
MD5
3415a93b795c772d202d64ed389666ae
-
SHA1
b5aa030783f74e71dfbf8f16598283e73b688d0a
-
SHA256
51f2c3e1fd7d5a9a2d9c736c26a85c1870dbefea4254a3697d79aa095cb157f5
-
SHA512
e67e51ac983b2150010a40dac02a5e2f0f1d7a23502552a2e12538478800b1f4c0ebbed3539c15f32137701d12e189827aa9e1e6c0edd7327dc8102299eaf0f1
-
SSDEEP
786432:dEDpbLRYIhPp1zfGXUFmq+wjZywUUq/IkCregzvXWIaPQwv9U+Tn:d+pbLRFZfjuUgq+wjbIIkeeg7XRO9U8n
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
XWormLoader 5.2 x64.exepid process 680 XWormLoader 5.2 x64.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/680-10-0x0000016300C40000-0x0000016301878000-memory.dmp agile_net -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
XWormLoader 5.2 x64.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x64.exe -
Processes:
XWormLoader 5.2 x64.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\TypedURLs XWormLoader 5.2 x64.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
XWormLoader 5.2 x64.exepid process 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
XWormLoader 5.2 x64.exepid process 680 XWormLoader 5.2 x64.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
XWormLoader 5.2 x64.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 680 XWormLoader 5.2 x64.exe Token: 33 964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 964 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
XWormLoader 5.2 x64.exepid process 680 XWormLoader 5.2 x64.exe 680 XWormLoader 5.2 x64.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
XWormLoader 5.2 x64.exepid process 680 XWormLoader 5.2 x64.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\XWorm V5.zip"1⤵PID:4084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3124
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\Readme.txt1⤵PID:1776
-
C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\XWormLoader 5.2 x64.exe"C:\Users\Admin\Documents\XWorm V5\XWorm V5.2\XWormLoader 5.2 x64.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:680
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x320 0x53c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8