Analysis

  • max time kernel
    90s
  • max time network
    71s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 11:56

General

  • Target

    XWorm-5.6-main/Xworm V5.6.exe

  • Size

    14.9MB

  • MD5

    56ccb739926a725e78a7acf9af52c4bb

  • SHA1

    5b01b90137871c3c8f0d04f510c4d56b23932cbc

  • SHA256

    90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

  • SHA512

    2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

  • SSDEEP

    196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

1hc7gkHuy3PD0WBM

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hxof32zd\hxof32zd.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCA2489788DAC4B479077126D9CEC7E3C.TMP"
        3⤵
          PID:2736
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2668
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x51c 0x4f8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:444
      • C:\Users\Admin\Desktop\XClient.exe
        "C:\Users\Admin\Desktop\XClient.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES6E07.tmp

        Filesize

        1KB

        MD5

        85b91e350ac07bbe6802ee153827ec1c

        SHA1

        c8274c8c197aff30a707742ab0d3f5a756c51414

        SHA256

        7f692d0334aa2fae444071547034fd4b17619ac9d3efcda0c66a9a32c784fd67

        SHA512

        c6690b70d701fa7715a17cecff4e85c085cf6ec5c09dad414f9ba9cf4880a18bddf5e69c885047fd647763b42e66bf74239cb7813198ca65f6c58a650c5ccb4f

      • C:\Users\Admin\AppData\Local\Temp\hxof32zd\hxof32zd.0.vb

        Filesize

        78KB

        MD5

        507963312a6046a8da23648a6e10f5a0

        SHA1

        9971c570cbe9e9cecaa80b7441b4a07a6d345f6a

        SHA256

        712b2d2738a0bdb419c1c2770d549c7ce10d39ead592f7d156ca5f000705d9de

        SHA512

        1ba786628b927efdd9f761fa7801119b31f7c14424beeb1461f4e348dfbd5b2edf61a9aa3b5f95d0c3bf01553da48f7dd530ee96c4dd5ebdc11fb79cd2bdf361

      • C:\Users\Admin\AppData\Local\Temp\hxof32zd\hxof32zd.cmdline

        Filesize

        290B

        MD5

        65b8bd49e933eadafc365f28a5ccc940

        SHA1

        d6b91d8285a099ead75cec61cea691b9b1e052d8

        SHA256

        3459e9ef0865c79ca1b6c9b6c9c37e51cea14ec1021c6428161c0856affa5740

        SHA512

        514e86cbf5d909937b168bbdb9410e64d15bbf07ad90db326eb2cfb2714e6970c8fd031443863b310fde31bba3ffc92760b6eb570dc4015ca3afa3c6cb093698

      • C:\Users\Admin\AppData\Local\Temp\vbcCA2489788DAC4B479077126D9CEC7E3C.TMP

        Filesize

        1KB

        MD5

        d40c58bd46211e4ffcbfbdfac7c2bb69

        SHA1

        c5cf88224acc284a4e81bd612369f0e39f3ac604

        SHA256

        01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

        SHA512

        48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

      • C:\Users\Admin\Desktop\XClient.exe

        Filesize

        32KB

        MD5

        f8211c9a75312304117625ee2517ec2d

        SHA1

        d12ff9b43fcfbe01acc40f3918412d861463b424

        SHA256

        a9e92509b18bdca6647f56f0fed6fcbfc292dccffee01cfc9392ccb224d8dece

        SHA512

        43f9d65c678282b5dc2e87501a7893f906571f9a09b0229ab3c4a219368da461cb107da1e1e5cbff60c3bce437c65618d708da92f2dcddb2ceeeb3b42303b64e

      • memory/3860-6-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-4-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-7-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-8-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-9-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-10-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-11-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-12-0x000002AF261E0000-0x000002AF26348000-memory.dmp

        Filesize

        1.4MB

      • memory/3860-5-0x00007FFE85063000-0x00007FFE85065000-memory.dmp

        Filesize

        8KB

      • memory/3860-0-0x00007FFE85063000-0x00007FFE85065000-memory.dmp

        Filesize

        8KB

      • memory/3860-3-0x000002AF1EDD0000-0x000002AF1EFC4000-memory.dmp

        Filesize

        2.0MB

      • memory/3860-2-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-27-0x00007FFE85060000-0x00007FFE85B21000-memory.dmp

        Filesize

        10.8MB

      • memory/3860-1-0x000002AF01790000-0x000002AF02678000-memory.dmp

        Filesize

        14.9MB

      • memory/3860-34-0x000002AF24460000-0x000002AF24512000-memory.dmp

        Filesize

        712KB

      • memory/3860-31-0x000002AF24180000-0x000002AF24202000-memory.dmp

        Filesize

        520KB

      • memory/3860-32-0x000002AF240F0000-0x000002AF2411C000-memory.dmp

        Filesize

        176KB

      • memory/3860-33-0x000002AF26350000-0x000002AF26632000-memory.dmp

        Filesize

        2.9MB

      • memory/4504-30-0x0000000000470000-0x000000000047E000-memory.dmp

        Filesize

        56KB

      • memory/4504-35-0x000000001BD20000-0x000000001BD2C000-memory.dmp

        Filesize

        48KB