Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2024, 22:04

General

  • Target

    XwormV5.3.exe

  • Size

    15.0MB

  • MD5

    d0eec7cf80098a85e6628d8834b7e153

  • SHA1

    aef442dbe12344111955d8a3b92427f03a8808b5

  • SHA256

    120286ca0a3f1e3805d5268c3110ac338b1d086ae5487bd25fdf4e1d917b1bce

  • SHA512

    50db066cc6e7402f635c73d4f770d0202b6c112db56a9d858c42df4f5816a07679f8f6c52efad0ce609390b792f4bd6887f39d5a9fddbd4ede912fb4fafcfa3b

  • SSDEEP

    393216:iwTnaP1qOj5Dg/lgp8BOVF3DS2k4tUUi6AreM:xTavq/q8w3DS2k4KNFr/

Malware Config

Extracted

Family

xworm

C2

96phaok.localto.net:1605

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XwormV5.3.exe
    "C:\Users\Admin\AppData\Local\Temp\XwormV5.3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\Admin\AppData\Roaming\FluxusV1.2"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2868
    • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe
      "C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1972 -s 732
        3⤵
          PID:2896
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {802A4104-C117-4B2E-9B51-31B5467D3CAD} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Users\Admin\AppData\Roaming\FluxusV1.2
        C:\Users\Admin\AppData\Roaming\FluxusV1.2
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1768
      • C:\Users\Admin\AppData\Roaming\FluxusV1.2
        C:\Users\Admin\AppData\Roaming\FluxusV1.2
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\XClient.exe

      Filesize

      72KB

      MD5

      acda38bc148d671863e1d32b577d7333

      SHA1

      6f9ed2412a759be9f23338da22a8c97e0617f6b4

      SHA256

      107932c23964beddec38325b5a6cbb0af19d3a5f1419678d7ba5fbc6b858008c

      SHA512

      535f3864b1b977cbf5dc1985632dbae418a3f135f4218ee3c407940cf25461f150634f2f23eb84840a77a1b7762e74ce9af15d3681d599d44a5e5191c37c0bb0

    • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe

      Filesize

      14.9MB

      MD5

      56ccb739926a725e78a7acf9af52c4bb

      SHA1

      5b01b90137871c3c8f0d04f510c4d56b23932cbc

      SHA256

      90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

      SHA512

      2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

    • memory/1040-7-0x0000000000A30000-0x0000000000A48000-memory.dmp

      Filesize

      96KB

    • memory/1040-14-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/1040-18-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/1040-19-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/1040-20-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/1720-0-0x000007FEF5B73000-0x000007FEF5B74000-memory.dmp

      Filesize

      4KB

    • memory/1720-1-0x0000000000F00000-0x0000000001DFC000-memory.dmp

      Filesize

      15.0MB

    • memory/1768-24-0x0000000000220000-0x0000000000238000-memory.dmp

      Filesize

      96KB

    • memory/1972-13-0x0000000000840000-0x0000000001728000-memory.dmp

      Filesize

      14.9MB

    • memory/2076-27-0x0000000000E30000-0x0000000000E48000-memory.dmp

      Filesize

      96KB