Overview
overview
10Static
static
10XWorm-5.6-main.zip
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...es.vbs
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...or.dll
windows10-2004-x64
1XWorm-5.6-...at.wav
windows10-2004-x64
6XWorm-5.6-...ro.wav
windows10-2004-x64
6XWorm-5.6-...xe.xml
windows10-2004-x64
1XWorm-5.6-....6.exe
windows10-2004-x64
10Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 11:56
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main/RES/XWorm.MBox.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/RES/XWorm.MIC.resources
Resource
win10v2004-20240910-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/RES/XWorm.Main.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
XWorm-5.6-main/RES/XWorm.Maps.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
XWorm-5.6-main/RES/XWorm.Performance.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XWorm-5.6-main/RES/XWorm.Port.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
XWorm-5.6-main/RES/XWorm.ProcessV.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
XWorm-5.6-main/RES/XWorm.Programs.resources
Resource
win10v2004-20240910-en
Behavioral task
behavioral10
Sample
XWorm-5.6-main/RES/XWorm.Proxy.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
XWorm-5.6-main/RES/XWorm.Ransomware.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
XWorm-5.6-main/RES/XWorm.Registry.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
XWorm-5.6-main/RES/XWorm.RemoteDesktop.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
XWorm-5.6-main/RES/XWorm.Resources.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
XWorm-5.6-main/RES/XWorm.RunPE.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
XWorm-5.6-main/RES/XWorm.ServiceManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
XWorm-5.6-main/RES/XWorm.Shell.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
XWorm-5.6-main/RES/XWorm.Sound.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
XWorm-5.6-main/RES/XWorm.StartupManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
XWorm-5.6-main/RES/XWorm.TBotNotify.resources
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
XWorm-5.6-main/RES/XWorm.TXT.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
XWorm-5.6-main/RES/XWorm.TcpConnectionForm.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
XWorm-5.6-main/RES/XWorm.ToolsBox.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
XWorm-5.6-main/RES/XWorm.VBCode.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
XWorm-5.6-main/RES/XWorm.VoiceChat.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
XWorm-5.6-main/RES/XWorm.WebCam.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XWorm-5.6-main/RES/XWorm.ngrok.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
XWorm-5.6-main/SimpleObfuscator.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
XWorm-5.6-main/Sounds/Chat.wav
Resource
win10v2004-20240910-en
Behavioral task
behavioral30
Sample
XWorm-5.6-main/Sounds/Intro.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
XWorm-5.6-main/XWorm V5.6.exe.xml
Resource
win10v2004-20240802-en
General
-
Target
XWorm-5.6-main/RES/XWorm.WebCam.resources
-
Size
100KB
-
MD5
0a82ee1d886148e7b149c3b4745ab653
-
SHA1
a6b3e0127fa58c4479d5cdc4bcaadd9b6e666424
-
SHA256
0ff62be2bcacad7ddda3b3cc32fee9c0a1c3bb5d72d81318728c1805204b2433
-
SHA512
6a13d2e45d710d80970dfdf0bc09ec0709fc88e62d22c4aa2cfe6c8dab18bee14e134d613b1fcf8204b70cd9950c82d040eaf718a97a8f64502d05e3ec9f6c0c
-
SSDEEP
768:LVLgN8K///iee8xxpe7ee8xxpe7ee8xxpe7ee8xxpeTD28g806Pj8ql:a1xxzxxzxxzxx2n0Tql
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 932 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\RES\XWorm.WebCam.resources1⤵
- Modifies registry class
PID:412
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4248,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:3248