General
-
Target
Launcher.exe
-
Size
7.4MB
-
Sample
240925-r631xavbmf
-
MD5
86e47632419e01d5a5a102ca0b9273e1
-
SHA1
1819b64f21b0290b0610899f4d4c64f6152a3cfc
-
SHA256
36caf389f8c2d1898c6a5b2df76b44dc5953852141b10c21ce4e8ea2db55b2b9
-
SHA512
f4d1901dedd42716a9343168afe013c19bb983f7c3e473b1216979aef54f882214013a66b8722e79ef94ff0d50e829372c47bbd27fbf2b0f43fefc0692c8052f
-
SSDEEP
98304:wTwedwe0xX21lEsTv9gubxzuVEXjqjvnvSboSM:wtwe0xXCWxubxzujvS8SM
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
89.85.183.63:928
ImuGwJzkMH1FDK0U
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Launcher.exe
-
Size
7.4MB
-
MD5
86e47632419e01d5a5a102ca0b9273e1
-
SHA1
1819b64f21b0290b0610899f4d4c64f6152a3cfc
-
SHA256
36caf389f8c2d1898c6a5b2df76b44dc5953852141b10c21ce4e8ea2db55b2b9
-
SHA512
f4d1901dedd42716a9343168afe013c19bb983f7c3e473b1216979aef54f882214013a66b8722e79ef94ff0d50e829372c47bbd27fbf2b0f43fefc0692c8052f
-
SSDEEP
98304:wTwedwe0xX21lEsTv9gubxzuVEXjqjvnvSboSM:wtwe0xXCWxubxzujvS8SM
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1