Resubmissions

17/10/2024, 00:08

241017-ae5a8avalj 10

17/10/2024, 00:04

241017-ac1v1s1bph 10

16/10/2024, 23:52

241016-3w4p8szgmc 10

16/10/2024, 23:50

241016-3v4c3szgja 10

16/10/2024, 22:52

241016-2tp9ds1dkk 10

Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/10/2024, 00:08

General

  • Target

    XWorm-5.6-main/Xworm V5.6.exe

  • Size

    14.9MB

  • MD5

    56ccb739926a725e78a7acf9af52c4bb

  • SHA1

    5b01b90137871c3c8f0d04f510c4d56b23932cbc

  • SHA256

    90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

  • SHA512

    2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

  • SSDEEP

    196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8888

Mutex

maoR2mXoJbzjTaPs

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mnndeezm\mnndeezm.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1CC5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc798B48D95CB64246867DDF781DA4E9F.TMP"
        3⤵
          PID:1868
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:224
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2564
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4764
        • C:\Users\Admin\Downloads\XClient.exe
          "C:\Users\Admin\Downloads\XClient.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1428

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES1CC5.tmp

          Filesize

          1KB

          MD5

          5acae0dea9d251698d4dedf6fee0955b

          SHA1

          7ebb336cd4c086bf8eee73b8ec8350efbcb0ee92

          SHA256

          a5f3ba72675b1fd95c8bc315c2d5f369dab6df27f1a2587f860fa1ed8411f283

          SHA512

          a9f470881c09daaabc86b67a377d62bf60843aa3088c8a60aee554ebbaa5342cb9c6ad2c6b620681119a0c45f9fd68279b8ec27ca32cf7cd51f8242b75944817

        • C:\Users\Admin\AppData\Local\Temp\mnndeezm\mnndeezm.0.vb

          Filesize

          78KB

          MD5

          7b664d0b4902d204ca39e672a1f30921

          SHA1

          47e51d13c186d01785f2f9ca32b4c523d88fb5e6

          SHA256

          98e2393a4a018274410aa6cefc5d958e6f4ba8f909619310fa6b711997bace9e

          SHA512

          9cba0750ec6eca48742441e02a8a5c691e913f73bf3f9b18eace51d21969bfc1dac681042d2b6e759e7c01a71b976383bb0c3546e745d02088656258814ee1aa

        • C:\Users\Admin\AppData\Local\Temp\mnndeezm\mnndeezm.cmdline

          Filesize

          292B

          MD5

          39446f2034cc3d62bff9f777e1a4f7e8

          SHA1

          9a52c29cb4cb4dbc3614b28f21165820e94c823e

          SHA256

          1c25bd4ae584bc2ce24621eba16ec016388cbc3de20c043dce9286d4535a213f

          SHA512

          d2e21a29ec8e2f3b3d6da346b1068a8953f952470ef8449103bf40d9c403572ce92ed34eb2915bb41b614c43c01e98b6a00208403c76c64cb3a0aa12750aa64d

        • C:\Users\Admin\AppData\Local\Temp\vbc798B48D95CB64246867DDF781DA4E9F.TMP

          Filesize

          1KB

          MD5

          d40c58bd46211e4ffcbfbdfac7c2bb69

          SHA1

          c5cf88224acc284a4e81bd612369f0e39f3ac604

          SHA256

          01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

          SHA512

          48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

        • C:\Users\Admin\Downloads\XClient.exe

          Filesize

          32KB

          MD5

          7f9066e565de32f43cb94d67cb5f4daf

          SHA1

          674a570057cfec4124097f402157d57689e566f6

          SHA256

          4b38b9ce5fb8080051015970eb58314fdfee9cf8cad406ea0cbc97ef6d090417

          SHA512

          4949b911d4235686123fd7925a3999d52582dd982fdfe98ee513dfffa2193de82ef159220d0ff977ab0ade5b7048d7bfc0f71848152931a52d694516f7dd4252

        • memory/1428-126-0x000000001B2B0000-0x000000001B2BA000-memory.dmp

          Filesize

          40KB

        • memory/1428-113-0x000000001B310000-0x000000001B332000-memory.dmp

          Filesize

          136KB

        • memory/1428-74-0x000000001C040000-0x000000001C160000-memory.dmp

          Filesize

          1.1MB

        • memory/1428-59-0x0000000000590000-0x000000000059E000-memory.dmp

          Filesize

          56KB

        • memory/3592-8-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-0-0x00007FF935933000-0x00007FF935935000-memory.dmp

          Filesize

          8KB

        • memory/3592-11-0x000001C1711C0000-0x000001C1711C9000-memory.dmp

          Filesize

          36KB

        • memory/3592-10-0x000001C171890000-0x000001C1718D6000-memory.dmp

          Filesize

          280KB

        • memory/3592-13-0x000001C171AD0000-0x000001C171AEE000-memory.dmp

          Filesize

          120KB

        • memory/3592-14-0x000001C1728D0000-0x000001C1728DB000-memory.dmp

          Filesize

          44KB

        • memory/3592-20-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-21-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-27-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-28-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-35-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-41-0x000001C17D0A0000-0x000001C17D208000-memory.dmp

          Filesize

          1.4MB

        • memory/3592-9-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-12-0x000001C1718E0000-0x000001C1718ED000-memory.dmp

          Filesize

          52KB

        • memory/3592-7-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-6-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-56-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-5-0x00007FF935933000-0x00007FF935935000-memory.dmp

          Filesize

          8KB

        • memory/3592-4-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-70-0x000001C172180000-0x000001C172202000-memory.dmp

          Filesize

          520KB

        • memory/3592-71-0x000001C172120000-0x000001C17214C000-memory.dmp

          Filesize

          176KB

        • memory/3592-72-0x000001C17D3F0000-0x000001C17D6D2000-memory.dmp

          Filesize

          2.9MB

        • memory/3592-73-0x000001C17CDC0000-0x000001C17CE72000-memory.dmp

          Filesize

          712KB

        • memory/3592-3-0x000001C172E00000-0x000001C172FF4000-memory.dmp

          Filesize

          2.0MB

        • memory/3592-2-0x00007FF935930000-0x00007FF9363F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3592-1-0x000001C16DB20000-0x000001C16EA08000-memory.dmp

          Filesize

          14.9MB