Analysis
-
max time kernel
389s -
max time network
384s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-10-2024 13:06
General
-
Target
XWorm-5.6-main.zip
-
Size
24.8MB
-
MD5
98af17dc86622b292d58fbba45d51309
-
SHA1
44a7d9423ce00ddda8000f9d18e3fe5693b5776f
-
SHA256
eed75f0edf37bdd0d0a64ac8723672dbfe64288fb3845b89cc3596d0511f67d1
-
SHA512
b3b9c67e373bcba5bd039088953400a3296b374f29f5de00f56c0702da7f9eccf0c452586d486c17ab1ea5ab16240112fda8457ec258d2ba9735b17959db4b05
-
SSDEEP
786432:3vngbHGYI0DuXXEDgfI+tjIdubuu0SVww6vZqwffr:fgbHGY2hfI8yuxV7oswXr
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
OI6iZgjnsVJKGNav
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
xworm
127.0.0.1:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 11 IoCs
resource yara_rule behavioral1/files/0x001c00000002ab54-301.dat family_xworm behavioral1/files/0x001c00000002ab60-311.dat family_xworm behavioral1/files/0x001c00000002ab60-318.dat family_xworm behavioral1/memory/2040-320-0x0000000000FF0000-0x000000000100A000-memory.dmp family_xworm behavioral1/files/0x001b00000002ab5f-359.dat family_xworm behavioral1/files/0x001900000002ab68-374.dat family_xworm behavioral1/files/0x001900000002ab68-376.dat family_xworm behavioral1/memory/240-378-0x0000000000EF0000-0x0000000000F08000-memory.dmp family_xworm behavioral1/files/0x001e00000002ab5f-420.dat family_xworm behavioral1/files/0x001a00000002ab68-435.dat family_xworm behavioral1/memory/3352-437-0x0000000000710000-0x000000000071E000-memory.dmp family_xworm -
Executes dropped EXE 6 IoCs
pid Process 1048 Xworm V5.6.exe 2040 XClient.exe 988 Xworm V5.6.exe 240 XClient.exe 3352 XClient.exe 1540 XClient.exe -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 pastebin.com 21 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\TypedURLs Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\TypedURLs Xworm V5.6.exe -
Modifies registry class 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4044 7zFM.exe 1048 Xworm V5.6.exe 988 Xworm V5.6.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 4044 7zFM.exe Token: 35 4044 7zFM.exe Token: SeSecurityPrivilege 4044 7zFM.exe Token: 33 400 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 400 AUDIODG.EXE Token: SeDebugPrivilege 1048 Xworm V5.6.exe Token: SeDebugPrivilege 2040 XClient.exe Token: SeDebugPrivilege 240 XClient.exe Token: SeDebugPrivilege 988 Xworm V5.6.exe Token: SeDebugPrivilege 3352 XClient.exe Token: SeDebugPrivilege 1540 XClient.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 4044 7zFM.exe 4044 7zFM.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 1048 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1048 Xworm V5.6.exe 988 Xworm V5.6.exe 988 Xworm V5.6.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3460 1048 Xworm V5.6.exe 87 PID 1048 wrote to memory of 3460 1048 Xworm V5.6.exe 87 PID 3460 wrote to memory of 1564 3460 vbc.exe 89 PID 3460 wrote to memory of 1564 3460 vbc.exe 89 PID 988 wrote to memory of 3324 988 Xworm V5.6.exe 97 PID 988 wrote to memory of 3324 988 Xworm V5.6.exe 97 PID 3324 wrote to memory of 1796 3324 vbc.exe 99 PID 3324 wrote to memory of 1796 3324 vbc.exe 99 PID 988 wrote to memory of 4116 988 Xworm V5.6.exe 103 PID 988 wrote to memory of 4116 988 Xworm V5.6.exe 103 PID 4116 wrote to memory of 1700 4116 vbc.exe 105 PID 4116 wrote to memory of 1700 4116 vbc.exe 105
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4044
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4776
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4k2hddg4\4k2hddg4.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES497E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1BFD6DB520C241A2B6B7B95A81DB045.TMP"3⤵PID:1564
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4148
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004E01⤵
- Suspicious use of AdjustPrivilegeToken
PID:400
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gxhs4yub\gxhs4yub.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDF21.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC7607D1B3C0641A0B7D67DE8594791D3.TMP"3⤵PID:1796
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uz0x4y1k\uz0x4y1k.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD70.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc471F1C85EFE341CC8014281B8843E49.TMP"3⤵PID:1700
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4504
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e0f23092b7a620dc2f45b4a9a596029
SHA158cc7c47602c73529e91ff9db3c74ff05459e4ea
SHA25658b9918225aee046894cb3c6263687bfe4b5a5b8dff7196d72687d0f3f735034
SHA512be458f811ad6a1f6b320e8d3e68e71062a8de686bae77c400d65091947b805c95024f3f1837e088cf5ecac5388d36f354285a6b57f91ea55567f19706128a043
-
Filesize
78KB
MD571cb42b38f2b3946d97fb7e21c8aba5a
SHA1b3cfd34dfbc110fade4aef5bb5bba3bcb28f8423
SHA256f14ec20f71f40f73c9e42004de393f31c79141042544dec8d33910d601fc87a3
SHA51248dc5aafc794458153de4b51e371f00dec8d055db52252293943dc5e1afc8b8752305447ae880e66fe823e76247b4549e2914f57fe4aaa12a049cea62f3d58d4
-
Filesize
322B
MD5d6e9ec6a788dd7b5ac6644abf5cf4d4d
SHA141e28fc81947b8b1304f8536a93082a6cda7a71a
SHA256f1578d96eb9b26dec815fafffb83642070b1378af9e4357318e241bea16ee71a
SHA51272b63d513be07370fcbf911c9453b87b9af41294221cf92803eb16056f5350d4b7213bab3eb00989781ecc7ab5d78b4e2fc09ec87aff243d4ebf0ae08b314a9b
-
Filesize
1KB
MD52bda7895e08d9697be5d8c8d040fe656
SHA159794f69a9303b16c55dcfd896f593b15db2fd90
SHA25669063ef15cf6d820fea4f45f9e9290bc26970b92ca37b783ca86212d9acb9b01
SHA5129c24f6356b145db93fbd0777ccc6f94a70f9040e851e0c38de2a9948bc8374111e429987e6c4ca7ac6821ec496be2276adc5ec170f635443bfc4b52c3b354e14
-
Filesize
1KB
MD559b0d6477572ee89534d14709d5a5d2d
SHA1816bb866447ea3fb78e237ccd3a3aed8fdd2d202
SHA256ea7c43b08e6412e3bf66d4ad097be264228ac05d4ae838ea64c5e76e12f35d53
SHA5123d9fc66b40ff77d9b1b6fd7d6e7e6cb312e2b34b71d30b6210ce68a2de9ace00a8acb6f514395122f345c79db7a01770c22278b9762420137166db32fa155130
-
Filesize
1KB
MD577c9051555ce6313ad9a17e8540011aa
SHA16e45cd3f1ee8f540854b3bb3af8df9cda7e42369
SHA2564528d811b6a751abc8808b56ddcb29492b2660881ab05095bb5c871281ab92a1
SHA512ae27bcf8f07e9c244cfd734bacc493dfb27c24cc980295dc2a80cad292947563ff526152788b0b3c6a54682965d96af4a711b9fe9787d73b14a36f5ecc17d519
-
Filesize
78KB
MD5bd39fe6fbcc97a1f5b95c88847877960
SHA185ade326b7848ed5191a7e5ec21e08db82676764
SHA256996368d28497af801f95ee2ac67ffc7dae82f2c29e9bbc7179e4452114310a11
SHA5129013ec3be9c69d5d84f1e0933047acffd45a23f79c1a62999963f481920e1e380a981da1362c7c4c68703b26c9abbdde48bdbe0ea1354bb893875d50a00fa93b
-
Filesize
322B
MD52573f514d450867c055ab3e9f6bd7715
SHA190794772ad1503056c48770458aa7a3864580aa9
SHA256185c8d5cf660ec7d9fb55b869771ae3aaaf6c44ab8f753e64da154a43675a837
SHA5129706ca185e46a22736455f73557e387bb0cd7093eaa65a05b3a114e6a3219baea8027a65edf5128a8fb031e57ce9570c5f7d017bad424e822c8456501d7b1f56
-
Filesize
78KB
MD5e33a227b3fc4fe33cda6ce28325bbd4e
SHA1005f3ce2916651102ce2112b6877279c110df31d
SHA256bf2fdc2a86423a4a849f2c05e3a66306892ae0f70373be54a591996ebf9dfcce
SHA512a45b769d8bb6a9d1c4c70956420b55bd2ead3b0f27c0039710f9627928579ae9de307617fb2c279288d4abc01ac69e0589867df089ad780a332e56ba3ee5715b
-
Filesize
322B
MD55a6f01b34aeb4f0540e5f5b5d6fde7fa
SHA1b14c03ac83a4d930718142b4e077ac6cf4c3d3ff
SHA256004f2fb150f3d83d819225a194dd7fe7cf2aad84cdd2264ecc348aa218d5df60
SHA512b9b027a81846b29bf31337fef79b9948bd5cf7bd57005763ca1958f6fa333db18b6adeed57d35fe98fddde8c2ab0ca958fce3699109fe0c693f1321b9c9f816f
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
1.4MB
MD59043d712208178c33ba8e942834ce457
SHA1e0fa5c730bf127a33348f5d2a5673260ae3719d1
SHA256b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c
SHA512dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
45KB
MD5d3447f8b95f5107746819fcb52b9ed23
SHA18c8fdf9215b42462f85b1e9918a7ebd44b354c3d
SHA256c0ddafa82c51e307675e6d295fd1cd9955155d4bb32c700986075486b6b897e9
SHA5125ffd338e91b20a9f601678f4809b75466d2d1d0325e4df952f8b02df21883a5c9f8cc20d8395cbab6ae1fad40c554e158f935ab32707a1397d40df624f2e49ca
-
Filesize
68KB
MD569926d550de76928f18afc717b50a490
SHA10f0698ee57e04eaeb6f20f39e195fe897533a1e4
SHA256e279fbab9e74817484f1ef1fe15a178c204deda7748d761feb7c24edc4a4304f
SHA512aa7f3f8389cae5468281318a33f51be720bee592501ad0078e5757877a2b68d18f347045a49f28dfb8b095795f71cec3fcb4ba82af716fd332755bcd14868f47
-
Filesize
32KB
MD511f5ff83e3c261fd958b4bbbf660774b
SHA125a08e34ac76c285bc1b5a9625f8600d123f26ce
SHA2561506eac2e408628acf0dc894a099b61f767c240e9e9e2733caac6773910e6dcb
SHA512ede3c2acc23cc92ca5b5ef5b7e84c79ed68d9e7346e45444f57cb1c5a5d727dfb911e6df90b3d9bafe756e325f2059846fbfb2017af7fb383ac929c11eb3b4d1
-
Filesize
45KB
MD5eaf3093667184bc0e0bc90fce42d6a81
SHA1835e5e6caa05e196148c21031d20da58ceb44984
SHA256107d8190f1dc6e26b3107fc3bd1536b8ef662d70a03580115ceb999225240cb0
SHA5125c8d36b0f9dab67c8d88f25910ad0dc75f0cb4b6743eda95f86681245cbfb5216074ce6f9d4522525f2e558de183be2c5370572371bfbafaef0740118d375c09
-
Filesize
76KB
MD5fca15bb2260c536776e36a40ea50e926
SHA1e807d6d1ed598f00fee06b87c71daee6d9e3ba77
SHA256e6f31bc23b724429b2ec4c0fd0ba017ec5caa1ab96f749d781b13ef6e7500955
SHA5121b2b546153adc1ec5373a3a007fee63f9b46cb3584344aba08be743b8ef99e22fc1c13e3919bfb22cf940f84e8d677be15755cc3e7f410f986bff16602e42246
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
Filesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed