Overview
overview
10Static
static
10XWorm-5.6-main.zip
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...es.vbs
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...or.dll
windows10-2004-x64
1XWorm-5.6-...at.wav
windows10-2004-x64
6XWorm-5.6-...ro.wav
windows10-2004-x64
6XWorm-5.6-...xe.xml
windows10-2004-x64
1XWorm-5.6-....6.exe
windows10-2004-x64
10XWorm-5.6-...er.exe
windows10-2004-x64
10Analysis
-
max time kernel
272s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 11:40
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main/RES/XWorm.MIC.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/RES/XWorm.Main.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/RES/XWorm.Maps.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
XWorm-5.6-main/RES/XWorm.Performance.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
XWorm-5.6-main/RES/XWorm.Port.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XWorm-5.6-main/RES/XWorm.ProcessV.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
XWorm-5.6-main/RES/XWorm.Programs.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
XWorm-5.6-main/RES/XWorm.Proxy.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
XWorm-5.6-main/RES/XWorm.Ransomware.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
XWorm-5.6-main/RES/XWorm.Registry.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
XWorm-5.6-main/RES/XWorm.RemoteDesktop.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
XWorm-5.6-main/RES/XWorm.Resources.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
XWorm-5.6-main/RES/XWorm.RunPE.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
XWorm-5.6-main/RES/XWorm.ServiceManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
XWorm-5.6-main/RES/XWorm.Shell.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
XWorm-5.6-main/RES/XWorm.Sound.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
XWorm-5.6-main/RES/XWorm.StartupManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
XWorm-5.6-main/RES/XWorm.TBotNotify.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
XWorm-5.6-main/RES/XWorm.TXT.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
XWorm-5.6-main/RES/XWorm.TcpConnectionForm.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
XWorm-5.6-main/RES/XWorm.ToolsBox.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
XWorm-5.6-main/RES/XWorm.VBCode.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
XWorm-5.6-main/RES/XWorm.VoiceChat.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
XWorm-5.6-main/RES/XWorm.WebCam.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
XWorm-5.6-main/RES/XWorm.ngrok.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XWorm-5.6-main/SimpleObfuscator.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
XWorm-5.6-main/Sounds/Chat.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
XWorm-5.6-main/Sounds/Intro.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
XWorm-5.6-main/XWorm V5.6.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
XWorm-5.6-main/Xworm V5.6.exe
Resource
win10v2004-20240802-en
General
-
Target
XWorm-5.6-main/Sounds/Chat.wav
-
Size
45KB
-
MD5
832a3652fd780edcdb2439ec33532c0d
-
SHA1
f0754ee6519d77700f5ee5b744b8c99386d7b577
-
SHA256
45f4136e58a5f749d125d2ab54308f81954d2c5b364b66013660a6c358845d1e
-
SHA512
3b3b55afcdfa00d9b7085b20ed52a7b4d8b7d403f5d0d1c539781db1a20257efd8c856e19b8f32ea33766a580690b498ff063849519691a9a4cbbcd3e9447cd4
-
SSDEEP
768:QVPqefmaP5C3KduJn13jSHYHzIcr6DPW75Pvi3Fy5NQbIbhuJLA+LhDclY3Rp6:yP1mU5GlJnBS4TIQ6o163ofQ8b4Pfm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{2BA93C10-A4F0-4995-84AD-3F56AD7A1976} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 1652 wmplayer.exe Token: SeCreatePagefilePrivilege 1652 wmplayer.exe Token: SeShutdownPrivilege 2444 unregmp2.exe Token: SeCreatePagefilePrivilege 2444 unregmp2.exe Token: 33 2252 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2252 AUDIODG.EXE Token: SeShutdownPrivilege 1652 wmplayer.exe Token: SeCreatePagefilePrivilege 1652 wmplayer.exe Token: SeShutdownPrivilege 1652 wmplayer.exe Token: SeCreatePagefilePrivilege 1652 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3088 1652 wmplayer.exe 88 PID 1652 wrote to memory of 3088 1652 wmplayer.exe 88 PID 1652 wrote to memory of 3088 1652 wmplayer.exe 88 PID 3088 wrote to memory of 2444 3088 unregmp2.exe 89 PID 3088 wrote to memory of 2444 3088 unregmp2.exe 89
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Sounds\Chat.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2408
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d0 0x3101⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5f1e019a915eb885f5dfdbc5cfdcd2127
SHA105aa21b463d07ffc85eab8e87a01911fe082f410
SHA2568e3d6a1804525a20fb466f7ea14792f2abc3a7ca01e271639537cd17e52cb538
SHA5128bbd0c7b4b8be3bad58701f5a46e8d5f3cf9c6ff3d16c997244d872a6a8584169a2e51910e27d9304b0ee27e7f937f5d7cb875b2578114ff9a8c7d0f63779056
-
Filesize
68KB
MD50530b339893e8bab38c02cc791b51a4f
SHA155c6459a050f6e204ae3a67125160db1db08f171
SHA2565d89bd3f2d1ce8c8f65a9ee41ccfd0ec79d95ae376a08fc87fe7fd9e8c620121
SHA512de97e050934326d398ee48d5374d3353f39a576ea4402218df4f23000d0141aa116262f8ab9251c7a63fc32e5dc7391050f6eaaea364a5fbd708e490d8e12792
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD53c822bcafd14dfaa8fa8752079c1afef
SHA1168762db5550d54c484bbf8d47414d40e92f4453
SHA256f28800caf2b905acb530ceb69a17bf2c9d0af918cc97687c801e776c9abef5b2
SHA512d75464a7a439789e887d5e9781c646067e17914c4e6797dc3a103f08a5c56ef43edc6c5ffba718a5b2f8b28fdb4ae76a5bb8bf9d17048cac9999e5ad7efdd805