Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 10:39

General

  • Target

    XWorm-v5.6-main/Xworm V5.6.exe

  • Size

    16.9MB

  • MD5

    97d68ae3931a39ff0e4cffee22a1b161

  • SHA1

    a5a815ad153c0dc428e02f3f4e5bd8f23deb2c03

  • SHA256

    c8a9ad538458d0afd1700a39ce21e7754eeefad5664350bb0c89a431637a8ba9

  • SHA512

    510ea25ac3fcf67d9d4cf225dc00fff7526248374431f1e9a0a000a648f02918bd6dec212d10d5a795599602faf8766348ab568bfc4174f57ccd12f74adae69c

  • SSDEEP

    196608:ctkbVVEZz/BAe1d4ihvy85JhhYc3BSL1kehn4inje:KoDAbyIhhkRka4i

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm-v5.6-main\Xworm V5.6.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm-v5.6-main\Xworm V5.6.exe"
    1⤵
    • Enumerates system info in registry
    PID:4720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4720-0-0x00007FF8871F3000-0x00007FF8871F5000-memory.dmp

    Filesize

    8KB

  • memory/4720-1-0x000002A85B6A0000-0x000002A85C786000-memory.dmp

    Filesize

    16.9MB

  • memory/4720-2-0x000002A877080000-0x000002A877274000-memory.dmp

    Filesize

    2.0MB

  • memory/4720-3-0x00007FF8871F0000-0x00007FF887CB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4720-4-0x00007FF8871F0000-0x00007FF887CB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4720-5-0x00007FF8871F3000-0x00007FF8871F5000-memory.dmp

    Filesize

    8KB

  • memory/4720-6-0x00007FF8871F0000-0x00007FF887CB1000-memory.dmp

    Filesize

    10.8MB