Resubmissions

25-09-2024 13:50

240925-q5l6bssapb 10

24-09-2024 19:49

240924-yj5pjssarl 10

24-09-2024 19:44

240924-yf3e1s1hkr 10

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 13:50

General

  • Target

    XWorm/XWorm V5.1/XWorm V5.1.exe

  • Size

    9.3MB

  • MD5

    540a501c683c91729e712fe83cf4e92f

  • SHA1

    d426473f486cd7b46ec8d3bae4a3f9b42f780f89

  • SHA256

    567ac8995973807a1288847d357dd8014118f07194a4db64cccaeab5871d54e1

  • SHA512

    25aa06429cc1272c1932e543d41563905964ef2b7dad9e6b0a13aee8c6fff5a4a9e9f4ba023435d265ddb36cdfebaca8efadfd8e9a3918747e29a2764e09a2a6

  • SSDEEP

    196608:fHMCjsbDbqTw0l1s3PIump2n7lpQutrONgFETLU6Jz8p:fHaXYDXs3PIo7wutrMYEB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.1\XWorm V5.1.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.1\XWorm V5.1.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/XCoderTools
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:537610 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:668686 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbc56bfe36c0f9475669b206d47f98da

    SHA1

    d124595b8ec2cae3709c0c92a61cc7d4aee9ff48

    SHA256

    8aed267a6dc78ef729b0e21333bd57a02ece98cb005e340a73b6da401931a5f0

    SHA512

    b5a64f9a7178d0fbc0864f8a0e239c62096dd5d8aed34c739c65aca2564acfa585b47fb261eb86305cbbbf199aae2cf44d10fd1c6b152a98745d130f81996a96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2016273f04b13ad30227d9f2eb842cdd

    SHA1

    74d5ac285d1bdce3cee0046e39b5d053be1dbebf

    SHA256

    819f736a310e8f0b2ab4b784b119ff384dd00b9ae6aeeda2dc7fb2e1a2a5126a

    SHA512

    30f296f646ec44095ba0769d7f367a081305279e04642af13a39b08dba52f68a0a2c5cbac6936277bfd43a76e549cb07b4e98559dacf3c5f38c9e27c92056060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17a9450d012d769b878d2bfd6629aeec

    SHA1

    759d6a4ce280912b4628200c3d81a311d3602bb0

    SHA256

    f5da24ea88f1d7095c3dde87d5653324b2dbcf1a3a1581cf3ec898c1abde73ee

    SHA512

    662e05bc6de2a461fa8e4048e60f9fc476c96392dbe99af36f4ede3614c73d392803edc72e91ccf753d3afbe1ab9659efb08487c54cc9ee45c4f29eb89e232b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27bb4d76bdea1273e9d43910d61e229e

    SHA1

    f3419e25c3faa2021d994436071ed012d6685fe6

    SHA256

    1fb504caa2fcb80cd052a016eb616cb718b5464f5a4d553bb54a11f001101497

    SHA512

    10e117511218869d74eb7ff9e4dfe2dcda4bca40c64ae858badcad9071f738662032c34a17ebda79808b20efb41f37be6779ea25159d35dbea3efd956e860f78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    828151f0078e29ec5b7ba81bd12fed21

    SHA1

    93fc59a353eaf6d56cc7cfb084760ff97d55ba83

    SHA256

    209d1096f8af4fb573a2a9425caf3e4d224cd8ffc5f05525562b8c3b85729e15

    SHA512

    d6707a569d9aa8e8d161b0ba7955cfd5258f8591bef7e33b50f01545b5573077f273b519cebfd9d80ebeaf4c27d823dd162c5f4422b23c6a3b3274c3ee70644a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    755a4d9b2ee3560979d5e10e09211b3e

    SHA1

    425d05d88601c71948e9c09793d3e2c95df51abb

    SHA256

    9b691fd1f7b17b00a8f8675340b12b927bd45b278a6756af7a7f295c3d8f77bc

    SHA512

    f62c11bb90f9b4dbd140354d0d40570a4ad62f0b5f1cb574ea7176e606cecd93ce4ac8fc61fbcb8d4d973139f4ebfe9a0f5a744f51d3f63eb671e218ed15a6f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ef73f3efba7876292bf787938e80a10

    SHA1

    0c530dfac5593d1e98b5d7e3df4ef4660994f03c

    SHA256

    1fb8eedfa1da618118b37082c993a9ef1e7ba885ce0f459d23241230bd25097f

    SHA512

    c2245aac28415c03222b9a318fe751977c6c5b86bd50480befcc7d2ada280151f1795b2a4e1c18ffbe497cc6d626e2f85f6093e8d4216aa62ef33f431d4bdcda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08d644e089d654593407f5a2c069e5b8

    SHA1

    01e8e4259ab3f4a3fb75cc276957a43f2900ea3c

    SHA256

    5131945d5150d881993a5b17e5c98ecf08a83c77bd9b6151c3729b93791d7a5b

    SHA512

    afb7b86e82112d879a0ede1d8153f1e3bde1d36b8d4651ca7bf9a06a8e43078d0b58c8fbb1f7113f6420ff80c1eab6a46cd1bf32f480fbb9d1a95f18c615ea4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e95123efb6a0aad258d8d22cf8055370

    SHA1

    e2e114c86634b5fd52c513a3fe274df6e9dd7023

    SHA256

    12f2d2934faa7f7645c64d073ac062e70c80b793ae0f875f51dd189ba967c235

    SHA512

    ebf575813011e151166029be58ad4a881f2986bf90b9bed9a18bf699f0b089ffcb6003b5315e653720d4fafb0bfe42e56b279549dcd0d2133185993799d65b85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    853af6aa8d62233d740d561b1d19b0ca

    SHA1

    b720e824684c2cce4d178e4c5c8f51ba5afaf3df

    SHA256

    babe0833e946a263c3938aa6512361a798d3cc7a3c9515d2598d844f71b3b29e

    SHA512

    1facddabea6d9e43675969e07642527da644f5ff75d7aa02db7fe9abdf9eb1bab3a4c2ee367c8999ebaaa56d2a61a0f7ea7f318c0754518395a4b6b3a9e53f43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    544addf440fb70ea5d4ab3e5d4c6d7ab

    SHA1

    0856a43fe872444a6d4095660e9a7ee410f4b7a5

    SHA256

    380d92d6e2b867241ff7f6e20c5dd5442ea5fd2fefbb8fea146197743fdb5b44

    SHA512

    a66d7d7d9ce892c3bca480c69154aa7595f714a648e8fb4ae7758b50ef264c3fcd42f7fe28563ead9ad1a9f571e76f939286d4cc8b59aaef74c10fcce836e920

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad0909d24b7915322f4cd32079da8646

    SHA1

    7c6212c49f55a0ad785b1455616fe2bfdd96c827

    SHA256

    941408b7b1111e1e1a661ab330730e12c29461654a704f29a69f9067ca0ecc43

    SHA512

    dcbbabe0e38766dc4aeec527e7bc806723e6e1656b91ccdd45aeab886a2f4f3cb5dfbb855daa252ef95d4e1c7f0d122ef6b6c13b6ace5034d8741b1c0b3c1a93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c339e88048f039b018dc728698516fc

    SHA1

    182fcfca3fe467ce15f192bac2630551b009573d

    SHA256

    bf6d6cf4dd3aee5a168e009f10d56840eac6dc524647195d3445134e0db9c64b

    SHA512

    80d983d560df3ca026eaefc9e26a7e7e9acb4c5d50e6482638de644ec354ee2e097b5badf8354582d814d966280634bcb9c178571f04c7942b615fd5d6d6539f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f342dad9a824eb1f6f2dab29725d1c67

    SHA1

    7d9f3de5d92d9d6bdeed910df0585d860374f070

    SHA256

    963dac3ee3b56fc952fb18d19aef45bcfb52716868c68c27cb45b1045f4ca47b

    SHA512

    9b962fc6e2b9ec8cf8e37704771edaeb8b87dd97cf189842e9deee5df66b68c88032b42b19ea1c445bfccf61b542cc30799cf9f44a9f008541d4cf60bed34841

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12d5812fd45096085b0d859799176c92

    SHA1

    0bc43227f6fa7926a8259442873cc5c564dfd664

    SHA256

    d94e66948e4566d701db0bc45b7f8029d96d5ccc48486540ddadce49b34e60f8

    SHA512

    0f31e0b7bf1618565efb7a916f31c74f478637ceb803c1d69ee7bdde9d97fb80df8972796e1bc670abc055491745cdda98d8dd464303da6a100cc0d64c332e77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83cfe4ee5452c8adfbe539eedf3882fd

    SHA1

    e01dfe3cdcc8d5194824fb199e5b81a680788e59

    SHA256

    51fcdcc49e67fe755a088bc7c36d5d5e958ee820481d418ce58a1154bd4c4d7b

    SHA512

    1a59c072d2d85e131ebe7c56e642306c74af767891e93fd581bf2e6b648ebfc463081b11910f65ee98c4659e4fd4336299dbc9bb4b1e5a7f144e0d5192c5c88c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81437adabe04663d24cdf8a250c55177

    SHA1

    fd78b84a5f989790af0f5ebd231717f4b13756c0

    SHA256

    b49b2cf86c8789a9ec2d8fd601edfe20778972aef8c4108dc8e003a22811ea99

    SHA512

    4098c9053e362b65e70646a99501db5940f89d0f3c65c47df49dd9cd3163ebecedf2d9590ce4c519c03f7809eb24eab100cf995c2f7513111d55f2acc154de85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ee1c379152c4204248920535866b05c

    SHA1

    30ca855bad10a8f4d82c93c4fb28d032f4a4fb62

    SHA256

    5b8f1d12f2f663794c7bac51115a3da738b82727d08c9c9043c4dac856d9276d

    SHA512

    7b1081343969fa968089f740aa09f3024b671bc54d85a38fa57eb13d3e634cf48c833b2cf8ca9b6836ab795c5de9d382fe95f27e969becd5a7004368f0d663cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    708591ae84813aebb4f4b2ef1903511b

    SHA1

    6650178b843fcd399388d9a537600c8b3180e7c3

    SHA256

    ca5e3fc6619d10d090fd9a1190bd96d9bfecfc6f05bef7d28100b4f0dca2f202

    SHA512

    d62afa73a12b98ae5aebfc72afc9888632889c6309e734e1987114974f5088e8a6b03bb664491b66b9bdb5758b94ebf9e1a7804f019af2e689e7d64b82d3c147

  • C:\Users\Admin\AppData\Local\Temp\Cab48A6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4946.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\eakSv\eakSv.dll

    Filesize

    112KB

    MD5

    2f1a50031dcf5c87d92e8b2491fdcea6

    SHA1

    71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

    SHA256

    47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

    SHA512

    1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

  • memory/1280-13-0x000007FEF51D3000-0x000007FEF51D4000-memory.dmp

    Filesize

    4KB

  • memory/1280-1-0x0000000000AB0000-0x0000000001402000-memory.dmp

    Filesize

    9.3MB

  • memory/1280-0-0x000007FEF51D3000-0x000007FEF51D4000-memory.dmp

    Filesize

    4KB

  • memory/1280-8-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1280-9-0x000000001C4F0000-0x000000001D0A0000-memory.dmp

    Filesize

    11.7MB

  • memory/1280-10-0x000000001D290000-0x000000001D484000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-11-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1280-12-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1280-14-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1280-15-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp

    Filesize

    9.9MB