Analysis
-
max time kernel
82s -
max time network
84s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-10-2024 20:58
Behavioral task
behavioral1
Sample
XWorm V5.6.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
XWorm V5.6.zip
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm V5.6/Xworm V5.6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
XWorm V5.6/Xworm V5.6.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
XWorm V5.6/XwormLoader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
XWorm V5.6/XwormLoader.exe
Resource
win11-20241007-en
General
-
Target
XWorm V5.6.zip
-
Size
25.2MB
-
MD5
3df07d8344e5800f75f38fdade2aaec0
-
SHA1
133feffb7e48be2ce194324972d6e0424f2fd52f
-
SHA256
1836e05f25dddf9426969e13ab80d1dcdf8d7b496b1a05d98ebae9303c18b956
-
SHA512
38b91983dbc23e6bbb3443045aea54952f93da08ce68aa661583c9522c30a9e22a1c16bf99bfdc6a39a8a4bae353ef12ba978357ab8a3315fde2275bc4ff8579
-
SSDEEP
393216:Cv6y2gszSnnHTrQWQD59U/p+HZZPz+NJWRL4UPBu+89YWOcC16kh0upLTLrD9dO6:MwSnHTm59UhfJWRbPwYiC1euNrbO6
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1092 Xworm V5.6.exe 1588 XwormLoader.exe 2408 XwormLoader.exe 3308 XwormLoader.exe -
Loads dropped DLL 3 IoCs
pid Process 1588 XwormLoader.exe 2408 XwormLoader.exe 3308 XwormLoader.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1588 set thread context of 4364 1588 XwormLoader.exe 88 PID 2408 set thread context of 1280 2408 XwormLoader.exe 91 PID 3308 set thread context of 1080 3308 XwormLoader.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeRestorePrivilege 3020 7zFM.exe Token: 35 3020 7zFM.exe Token: SeSecurityPrivilege 3020 7zFM.exe Token: SeSecurityPrivilege 3020 7zFM.exe Token: SeSecurityPrivilege 3020 7zFM.exe Token: SeDebugPrivilege 4364 MSBuild.exe Token: SeBackupPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeDebugPrivilege 1280 MSBuild.exe Token: SeBackupPrivilege 1280 MSBuild.exe Token: SeSecurityPrivilege 1280 MSBuild.exe Token: SeSecurityPrivilege 1280 MSBuild.exe Token: SeSecurityPrivilege 1280 MSBuild.exe Token: SeSecurityPrivilege 1280 MSBuild.exe Token: SeDebugPrivilege 1080 MSBuild.exe Token: SeBackupPrivilege 1080 MSBuild.exe Token: SeSecurityPrivilege 1080 MSBuild.exe Token: SeSecurityPrivilege 1080 MSBuild.exe Token: SeSecurityPrivilege 1080 MSBuild.exe Token: SeSecurityPrivilege 1080 MSBuild.exe Token: SeBackupPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe Token: SeSecurityPrivilege 4364 MSBuild.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3020 7zFM.exe 3020 7zFM.exe 3020 7zFM.exe 3020 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 1588 wrote to memory of 4364 1588 XwormLoader.exe 88 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 2408 wrote to memory of 1280 2408 XwormLoader.exe 91 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94 PID 3308 wrote to memory of 1080 3308 XwormLoader.exe 94
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1652
-
C:\Users\Admin\Desktop\XWorm V5.6\Xworm V5.6.exe"C:\Users\Admin\Desktop\XWorm V5.6\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:1092
-
C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
799KB
MD55c79d44ff8563412dce1bb36626781d6
SHA1a13da89b3ec6becd64e1a5aa2780bde27b4bc467
SHA256ecea21c9c2bd359747693dc3d34db8338547fdae7f06739336daa3d826a85135
SHA51225e594e2526e76307f67ebec73bb3c8d96fc4a4b170d8fdffead41b798a00ede67e0fbe3e3d99b54ce424c356a10a262312149d84d76c8248464b135c7cd3d18
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
Filesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed
-
Filesize
576KB
MD5f1a4c690564f491ad4f7fc8ce79e2fc3
SHA1cc16274baae2af0c614566d56b693774fe892168
SHA2560a3555b2ab1f76066c496eb43ebc520c82824a22cfcb714a75c5edc1ad99d88a
SHA512f7a1116b889493c079000847f5517e9149d5dce703b85b1520ad1d4810c575500aab47460a6e0d7e266fa5ef70ba10d4b625587725251734404913844897e180