General
-
Target
atw7ir_1.rar
-
Size
156KB
-
Sample
241028-x3662stjfx
-
MD5
70334252e42eaacc4797b94b2b083092
-
SHA1
feefba626ace211224bc2c6eab696ec383cfff43
-
SHA256
77a83d282a11436ce98f3135c4c52833be9a704a507bd8d53f5b8bc456419f9d
-
SHA512
7f96dcc8581fe2a24ee384d6a1a1a9dd73bb6391be9dc05a2e6047dc52e0fa0ae7fb7ee4fa88c09c8b2eea8553c70452da5d15bbf7b7e4870ce99566a3cab045
-
SSDEEP
3072:AUySvS21PhEeOhRH5GWoOtqTCz9FkjoYIfy0hIN1PLWey40h/ib:qSvSqNO35GWki5fjhIzzWey4k/ib
Static task
static1
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
winlogon.exe
-
pastebin_url
https://pastebin.com/raw/QUwdrCNg
Targets
-
-
Target
atw7ir_1.rar
-
Size
156KB
-
MD5
70334252e42eaacc4797b94b2b083092
-
SHA1
feefba626ace211224bc2c6eab696ec383cfff43
-
SHA256
77a83d282a11436ce98f3135c4c52833be9a704a507bd8d53f5b8bc456419f9d
-
SHA512
7f96dcc8581fe2a24ee384d6a1a1a9dd73bb6391be9dc05a2e6047dc52e0fa0ae7fb7ee4fa88c09c8b2eea8553c70452da5d15bbf7b7e4870ce99566a3cab045
-
SSDEEP
3072:AUySvS21PhEeOhRH5GWoOtqTCz9FkjoYIfy0hIN1PLWey40h/ib:qSvSqNO35GWki5fjhIzzWey4k/ib
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-