Overview
overview
10Static
static
10XWorm V5.6...ps.dll
windows11-21h2-x64
1XWorm V5.6...ns.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...ps.dll
windows11-21h2-x64
1XWorm V5.6...ox.dll
windows11-21h2-x64
1XWorm V5.6...ne.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...ns.dll
windows11-21h2-x64
1XWorm V5.6...me.dll
windows11-21h2-x64
1XWorm V5.6...ce.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...ms.dll
windows11-21h2-x64
1XWorm V5.6...re.dll
windows11-21h2-x64
1XWorm V5.6...ry.dll
windows11-21h2-x64
1XWorm V5.6...it.dll
windows11-21h2-x64
1XWorm V5.6...op.dll
windows11-21h2-x64
1XWorm V5.6...xy.dll
windows11-21h2-x64
1XWorm V5.6...PE.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...ll.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...ns.dll
windows11-21h2-x64
1XWorm V5.6...ss.dll
windows11-21h2-x64
1XWorm V5.6...er.dll
windows11-21h2-x64
1XWorm V5.6...at.dll
windows11-21h2-x64
1XWorm V5.6...nd.dll
windows11-21h2-x64
1XWorm V5.6...am.dll
windows11-21h2-x64
1XWorm V5.6...es.vbs
windows11-21h2-x64
1XWorm V5.6...or.dll
windows11-21h2-x64
1XWorm V5.6....6.exe
windows11-21h2-x64
1XWorm V5.6...er.exe
windows11-21h2-x64
7Resubmissions
23-09-2024 19:46
240923-yg58assfre 10Analysis
-
max time kernel
254s -
max time network
289s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-09-2024 19:46
Behavioral task
behavioral1
Sample
XWorm V5.6/Plugins/HiddenApps.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
XWorm V5.6/Plugins/Informations.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
XWorm V5.6/Plugins/Keylogger.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
XWorm V5.6/Plugins/Maps.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
XWorm V5.6/Plugins/MessageBox.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
XWorm V5.6/Plugins/Microphone.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
XWorm V5.6/Plugins/Ngrok-Installer.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
XWorm V5.6/Plugins/Options.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
XWorm V5.6/Plugins/Pastime.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
XWorm V5.6/Plugins/Performance.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
XWorm V5.6/Plugins/ProcessManager.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
XWorm V5.6/Plugins/Programs.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
XWorm V5.6/Plugins/Ransomware.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
XWorm V5.6/Plugins/Recovery.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
XWorm V5.6/Plugins/Regedit.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
XWorm V5.6/Plugins/RemoteDesktop.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
XWorm V5.6/Plugins/ReverseProxy.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
XWorm V5.6/Plugins/RunPE.dll
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
XWorm V5.6/Plugins/ServiceManager.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
XWorm V5.6/Plugins/Shell.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
XWorm V5.6/Plugins/StartupManager.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
XWorm V5.6/Plugins/Stealer.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
XWorm V5.6/Plugins/TCPConnections.dll
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
XWorm V5.6/Plugins/UACBypass.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
XWorm V5.6/Plugins/VB.NET Compiler.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
XWorm V5.6/Plugins/VoiceChat.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
XWorm V5.6/Plugins/WSound.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
XWorm V5.6/Plugins/WebCam.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
XWorm V5.6/RES/XWorm.Resources.vbs
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
XWorm V5.6/SimpleObfuscator.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
XWorm V5.6/Xworm V5.6.exe
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
XWorm V5.6/XwormLoader.exe
Resource
win11-20240802-en
General
-
Target
XWorm V5.6/XwormLoader.exe
-
Size
576KB
-
MD5
f1a4c690564f491ad4f7fc8ce79e2fc3
-
SHA1
cc16274baae2af0c614566d56b693774fe892168
-
SHA256
0a3555b2ab1f76066c496eb43ebc520c82824a22cfcb714a75c5edc1ad99d88a
-
SHA512
f7a1116b889493c079000847f5517e9149d5dce703b85b1520ad1d4810c575500aab47460a6e0d7e266fa5ef70ba10d4b625587725251734404913844897e180
-
SSDEEP
12288:bwl4OwitTdBZpKfSTUNe/RhCEIX7RIiZmWJyGpfxd8KR0F7Br1dfPDWUw+b5/xgo:bwDdtTdBZISTACRhCE+Gi1yG
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
XwormLoader.exepid process 2868 XwormLoader.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
XwormLoader.exedescription pid process target process PID 2868 set thread context of 1512 2868 XwormLoader.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
XwormLoader.exeMSBuild.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 1512 MSBuild.exe Token: SeBackupPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeBackupPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeBackupPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeBackupPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeBackupPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe Token: SeSecurityPrivilege 1512 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
XwormLoader.exedescription pid process target process PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe PID 2868 wrote to memory of 1512 2868 XwormLoader.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\XwormLoader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD55c79d44ff8563412dce1bb36626781d6
SHA1a13da89b3ec6becd64e1a5aa2780bde27b4bc467
SHA256ecea21c9c2bd359747693dc3d34db8338547fdae7f06739336daa3d826a85135
SHA51225e594e2526e76307f67ebec73bb3c8d96fc4a4b170d8fdffead41b798a00ede67e0fbe3e3d99b54ce424c356a10a262312149d84d76c8248464b135c7cd3d18