Overview
overview
10Static
static
10XWorm-5.6-main.zip
windows7-x64
7XWorm-5.6-main.zip
windows10-2004-x64
1XWorm-5.6-...io.dll
windows7-x64
1XWorm-5.6-...io.dll
windows10-2004-x64
1XWorm-5.6-...on.dll
windows7-x64
1XWorm-5.6-...on.dll
windows10-2004-x64
1XWorm-5.6-...ws.dll
windows7-x64
1XWorm-5.6-...ws.dll
windows10-2004-x64
1XWorm-5.6-...at.dll
windows7-x64
1XWorm-5.6-...at.dll
windows10-2004-x64
1XWorm-5.6-...um.dll
windows7-x64
1XWorm-5.6-...um.dll
windows10-2004-x64
1XWorm-5.6-...rd.dll
windows7-x64
1XWorm-5.6-...rd.dll
windows10-2004-x64
1XWorm-5.6-...ss.dll
windows7-x64
1XWorm-5.6-...ss.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...DP.dll
windows7-x64
1XWorm-5.6-...DP.dll
windows10-2004-x64
1XWorm-5.6-...NC.dll
windows7-x64
1XWorm-5.6-...NC.dll
windows10-2004-x64
1XWorm-5.6-...ry.dll
windows7-x64
1XWorm-5.6-...ry.dll
windows10-2004-x64
1XWorm-5.6-...ps.dll
windows7-x64
1XWorm-5.6-...ps.dll
windows10-2004-x64
1XWorm-5.6-...ns.dll
windows7-x64
1XWorm-5.6-...ns.dll
windows10-2004-x64
1Resubmissions
21-10-2024 14:09
241021-rgcgnawhjd 1021-10-2024 14:05
241021-rd8qpawglh 1021-10-2024 13:52
241021-q6ms9awdqf 10Analysis
-
max time kernel
842s -
max time network
843s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 14:05
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/XWorm-5.6-main/NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/XWorm-5.6-main/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
XWorm-5.6-main/XWorm-5.6-main/Newtonsoft.Json.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
XWorm-5.6-main/XWorm-5.6-main/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/ActiveWindows.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/ActiveWindows.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Chat.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Chat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Chromium.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Chromium.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Clipboard.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Clipboard.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Cmstp-Bypass.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/FileManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/FileManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/FilesSearcher.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/FilesSearcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HBrowser.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HBrowser.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HRDP.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HRDP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HVNC.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HVNC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HVNCMemory.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HVNCMemory.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HiddenApps.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/HiddenApps.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Informations.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
XWorm-5.6-main/XWorm-5.6-main/Plugins/Informations.dll
Resource
win10v2004-20241007-en
General
-
Target
XWorm-5.6-main.zip
-
Size
24.8MB
-
MD5
98af17dc86622b292d58fbba45d51309
-
SHA1
44a7d9423ce00ddda8000f9d18e3fe5693b5776f
-
SHA256
eed75f0edf37bdd0d0a64ac8723672dbfe64288fb3845b89cc3596d0511f67d1
-
SHA512
b3b9c67e373bcba5bd039088953400a3296b374f29f5de00f56c0702da7f9eccf0c452586d486c17ab1ea5ab16240112fda8457ec258d2ba9735b17959db4b05
-
SSDEEP
786432:3vngbHGYI0DuXXEDgfI+tjIdubuu0SVww6vZqwffr:fgbHGY2hfI8yuxV7oswXr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 Xworm V5.6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 7zFM.exe 2148 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2148 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 2148 7zFM.exe Token: 35 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: SeSecurityPrivilege 2148 7zFM.exe Token: 33 788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 788 AUDIODG.EXE Token: 33 788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 788 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe 2148 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1960 2148 7zFM.exe 31 PID 2148 wrote to memory of 1960 2148 7zFM.exe 31 PID 2148 wrote to memory of 1960 2148 7zFM.exe 31 PID 1960 wrote to memory of 3036 1960 Xworm V5.6.exe 32 PID 1960 wrote to memory of 3036 1960 Xworm V5.6.exe 32 PID 1960 wrote to memory of 3036 1960 Xworm V5.6.exe 32 PID 2148 wrote to memory of 2616 2148 7zFM.exe 33 PID 2148 wrote to memory of 2616 2148 7zFM.exe 33 PID 2148 wrote to memory of 2616 2148 7zFM.exe 33
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\7zO468123A7\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\7zO468123A7\Xworm V5.6.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1960 -s 7163⤵PID:3036
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO468DE0B8\CERTIFICATE2⤵
- Modifies registry class
PID:2616
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2300
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5481⤵
- Suspicious use of AdjustPrivilegeToken
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1