Overview
overview
10Static
static
10XWorm-5.6-main.zip
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...es.vbs
windows10-2004-x64
1XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...ources
windows10-2004-x64
3XWorm-5.6-...or.dll
windows10-2004-x64
1XWorm-5.6-...at.wav
windows10-2004-x64
6XWorm-5.6-...ro.wav
windows10-2004-x64
6XWorm-5.6-...xe.xml
windows10-2004-x64
1XWorm-5.6-....6.exe
windows10-2004-x64
10XWorm-5.6-...er.exe
windows10-2004-x64
10Analysis
-
max time kernel
300s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 11:40
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main/RES/XWorm.MIC.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/RES/XWorm.Main.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/RES/XWorm.Maps.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
XWorm-5.6-main/RES/XWorm.Performance.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
XWorm-5.6-main/RES/XWorm.Port.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XWorm-5.6-main/RES/XWorm.ProcessV.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
XWorm-5.6-main/RES/XWorm.Programs.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
XWorm-5.6-main/RES/XWorm.Proxy.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
XWorm-5.6-main/RES/XWorm.Ransomware.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
XWorm-5.6-main/RES/XWorm.Registry.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
XWorm-5.6-main/RES/XWorm.RemoteDesktop.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
XWorm-5.6-main/RES/XWorm.Resources.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
XWorm-5.6-main/RES/XWorm.RunPE.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
XWorm-5.6-main/RES/XWorm.ServiceManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
XWorm-5.6-main/RES/XWorm.Shell.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
XWorm-5.6-main/RES/XWorm.Sound.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
XWorm-5.6-main/RES/XWorm.StartupManager.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
XWorm-5.6-main/RES/XWorm.TBotNotify.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
XWorm-5.6-main/RES/XWorm.TXT.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
XWorm-5.6-main/RES/XWorm.TcpConnectionForm.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
XWorm-5.6-main/RES/XWorm.ToolsBox.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
XWorm-5.6-main/RES/XWorm.VBCode.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
XWorm-5.6-main/RES/XWorm.VoiceChat.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
XWorm-5.6-main/RES/XWorm.WebCam.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
XWorm-5.6-main/RES/XWorm.ngrok.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XWorm-5.6-main/SimpleObfuscator.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
XWorm-5.6-main/Sounds/Chat.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
XWorm-5.6-main/Sounds/Intro.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
XWorm-5.6-main/XWorm V5.6.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
XWorm-5.6-main/Xworm V5.6.exe
Resource
win10v2004-20240802-en
General
-
Target
XWorm-5.6-main/Sounds/Intro.wav
-
Size
238KB
-
MD5
ad3b4fae17bcabc254df49f5e76b87a6
-
SHA1
1683ff029eebaffdc7a4827827da7bb361c8747e
-
SHA256
e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
-
SHA512
3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
SSDEEP
3072:FU3hYG9X9JzhaLL5+QYKHZDa6D+4LT92KEpcP+b8FGUt0Ybs5e9jXjubLtNmBNs9:GjVsLL5lva6D+4P9llWvaGe9CHeBNm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{B7CEDC41-2F3B-47CA-A6D5-3BA73D7484E6} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4948 unregmp2.exe Token: SeCreatePagefilePrivilege 4948 unregmp2.exe Token: SeShutdownPrivilege 2104 wmplayer.exe Token: SeCreatePagefilePrivilege 2104 wmplayer.exe Token: 33 4424 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4424 AUDIODG.EXE Token: SeShutdownPrivilege 2104 wmplayer.exe Token: SeCreatePagefilePrivilege 2104 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1216 2104 wmplayer.exe 81 PID 2104 wrote to memory of 1216 2104 wmplayer.exe 81 PID 2104 wrote to memory of 1216 2104 wmplayer.exe 81 PID 1216 wrote to memory of 4948 1216 unregmp2.exe 82 PID 1216 wrote to memory of 4948 1216 unregmp2.exe 82
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Sounds\Intro.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5adbd8353954edbe5e0620c5bdcad4363
SHA1aeb5c03e8c1b8bc5d55683ea113e6ce1be7ac6e6
SHA25664eff10c4e866930d32d4d82cc88ec0e6f851ac49164122cae1b27eb3c9d9d55
SHA51287bf4a2dc4dd5c833d96f3f5cb0b607796414ffee36d5c167a75644bcbb02ab5159aa4aa093ed43abe290481abc01944885c68b1755d9b2c4c583fcccd041fd2
-
Filesize
1024KB
MD568fa1ddfa7efb2871550f7b5b2cbb1ba
SHA1a75a57eb0bd923a91b27c36405af7bf68da1e781
SHA256b2aef9c36ecd342105e6c016246457e9be21a6854fed3ad1adb74c7e8ff8d4e9
SHA51245672ac8848ee9bf304259ff55f667cf0f4b5cee923c41d2b2c51e1a1c92924a038788c5275f1fb11a6da598b1bd5eb7cb547ff7e93b48658d22ae9b35231ea8
-
Filesize
68KB
MD5af8922718279d1f332951c5bc7a19166
SHA1fb22c5de4643a81d39138af8bf15a03b73e175ba
SHA2565a04c26d4f306a1588cdfc7d97b74a0fc8d5c3d945b532f32903585aa7892844
SHA51228edc6a37b9c14bb69e7a76386075ea242b01e7e936a5deb4d2b3e19398c62cb07387a4ef0c4c6b35c789811fe55443cc2e36a7bbcadd8619afc8f6648613782
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD529b6e72bdfdf918036c30c923df0d040
SHA1a1df37103229db5483f6391f81259f939936b33c
SHA256be645fa93ce189a82a14d5bc6ba118a7cf7ce47502c53b978b775b1a7a544d7e
SHA512cf65a0c1f0a6e55ba0484896741712c462808dfaa72108d394a22159b1415fd3824a6667e838972a9cfaa4eab7537f57a457920045acd2e477d5cc572cf136b4