Analysis

  • max time kernel
    340s
  • max time network
    320s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 11:40

General

  • Target

    XWorm-5.6-main/Xworm V5.6.exe

  • Size

    14.9MB

  • MD5

    56ccb739926a725e78a7acf9af52c4bb

  • SHA1

    5b01b90137871c3c8f0d04f510c4d56b23932cbc

  • SHA256

    90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

  • SHA512

    2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

  • SSDEEP

    196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

SlX9k1N7cEJty72A

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 55 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jxkpvilj\jxkpvilj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6696.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc961846EFC4674B4281A3636C18194BD.TMP"
        3⤵
          PID:2588
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4468
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x35c 0x364
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
      • C:\Users\Admin\Desktop\XClient.exe
        "C:\Users\Admin\Desktop\XClient.exe"
        1⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
          2⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4328
      • C:\Users\Admin\AppData\Roaming\XClient.exe
        C:\Users\Admin\AppData\Roaming\XClient.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2204

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES6696.tmp

        Filesize

        1KB

        MD5

        aa789ed7cab10da9ed348107c9f0a1bd

        SHA1

        c355af770ebbc8e7c8d24ae9c86e6eb647ddd558

        SHA256

        41b8920f459ce4a39f9d8cef95d5bdc29294f831faf3c12cf482430aeb96280d

        SHA512

        85a30baeb57305db97fa21c04031f7567d47156b3cb51c6668f276cf604067c8b944b8b0f5db4321587c8aac35efd7e335a46ac1443cad043f025033048b7bea

      • C:\Users\Admin\AppData\Local\Temp\jxkpvilj\jxkpvilj.0.vb

        Filesize

        78KB

        MD5

        91790df1d4f35ae445fb5b7937523855

        SHA1

        e396c990c904b1636d92c5f6fc35f46f895aaf3f

        SHA256

        a1d49c92cc9754be9fa6bf2a22ce749504a0e4eb747964d341d9207b4f4b3fbe

        SHA512

        716da31a86145013bf3ca299610111108d8a5e2e2ea618d5d839f295570cf452f1934cfe958c825c3b981bcbd54adcbeb2791cc57293de420a907f544668d64c

      • C:\Users\Admin\AppData\Local\Temp\jxkpvilj\jxkpvilj.cmdline

        Filesize

        290B

        MD5

        df557c0282c51a0268aa0ee59e816108

        SHA1

        f51fa5dc858e1737de98e80d9520038a92e25d0d

        SHA256

        78bd425c8e848049b2800a48d6ae524febe00e99abc56e7539603171f289fb98

        SHA512

        ff033ca9cd41448e314f1a973a57501cab7b57f0cbfed9890a101fdac2f58a9c9e80243ba032c18df319e00bd99dc6eb1981a12feb30ada7a581e696b5d23f07

      • C:\Users\Admin\AppData\Local\Temp\vbc961846EFC4674B4281A3636C18194BD.TMP

        Filesize

        1KB

        MD5

        d40c58bd46211e4ffcbfbdfac7c2bb69

        SHA1

        c5cf88224acc284a4e81bd612369f0e39f3ac604

        SHA256

        01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

        SHA512

        48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

      • C:\Users\Admin\Desktop\XClient.exe

        Filesize

        35KB

        MD5

        78bc5c9fb69ef8d546a02bf71aedda00

        SHA1

        c8ec93c15117dcf705439909c307fbe100fc2af7

        SHA256

        733f9b631442a5b40f186466575f75812690fe40b4bf0a67a809334301b1e2dc

        SHA512

        73955632066cd98999068672ceb452e54878189ccf2b7301596cbeff2631a2ef79867c2cf22d41fca7ae3ed9141ce438216ff797b4872cdd60821714adba17d2

      • memory/2868-6-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-3-0x000001F35A5D0000-0x000001F35A7C4000-memory.dmp

        Filesize

        2.0MB

      • memory/2868-7-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-8-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-9-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-10-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-12-0x000001F3619E0000-0x000001F361B48000-memory.dmp

        Filesize

        1.4MB

      • memory/2868-5-0x00007FFFCDA13000-0x00007FFFCDA15000-memory.dmp

        Filesize

        8KB

      • memory/2868-4-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-0-0x00007FFFCDA13000-0x00007FFFCDA15000-memory.dmp

        Filesize

        8KB

      • memory/2868-2-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-1-0x000001F33CEC0000-0x000001F33DDA8000-memory.dmp

        Filesize

        14.9MB

      • memory/2868-46-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2868-34-0x000001F3617F0000-0x000001F361872000-memory.dmp

        Filesize

        520KB

      • memory/2868-35-0x000001F361760000-0x000001F36178C000-memory.dmp

        Filesize

        176KB

      • memory/2868-36-0x000001F3622B0000-0x000001F362592000-memory.dmp

        Filesize

        2.9MB

      • memory/2868-37-0x000001F361D00000-0x000001F361DB2000-memory.dmp

        Filesize

        712KB

      • memory/3364-39-0x00000000012E0000-0x00000000012EC000-memory.dmp

        Filesize

        48KB

      • memory/3364-44-0x000000001C270000-0x000000001C2FE000-memory.dmp

        Filesize

        568KB

      • memory/3364-29-0x0000000000960000-0x0000000000970000-memory.dmp

        Filesize

        64KB