Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
XwormV5.3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
XwormV5.3.exe
Resource
win10v2004-20241007-en
General
-
Target
XwormV5.3.exe
-
Size
15.0MB
-
MD5
d0eec7cf80098a85e6628d8834b7e153
-
SHA1
aef442dbe12344111955d8a3b92427f03a8808b5
-
SHA256
120286ca0a3f1e3805d5268c3110ac338b1d086ae5487bd25fdf4e1d917b1bce
-
SHA512
50db066cc6e7402f635c73d4f770d0202b6c112db56a9d858c42df4f5816a07679f8f6c52efad0ce609390b792f4bd6887f39d5a9fddbd4ede912fb4fafcfa3b
-
SSDEEP
393216:iwTnaP1qOj5Dg/lgp8BOVF3DS2k4tUUi6AreM:xTavq/q8w3DS2k4KNFr/
Malware Config
Extracted
xworm
96phaok.localto.net:1605
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000c00000001202c-5.dat family_xworm behavioral1/memory/1040-7-0x0000000000A30000-0x0000000000A48000-memory.dmp family_xworm behavioral1/memory/1768-24-0x0000000000220000-0x0000000000238000-memory.dmp family_xworm behavioral1/memory/2076-27-0x0000000000E30000-0x0000000000E48000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FluxusV1.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FluxusV1.lnk XClient.exe -
Executes dropped EXE 4 IoCs
pid Process 1040 XClient.exe 1972 Xworm V5.6.exe 1768 FluxusV1.2 2076 FluxusV1.2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\FluxusV1 = "C:\\Users\\Admin\\AppData\\Roaming\\FluxusV1.2" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1040 XClient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1040 XClient.exe Token: SeDebugPrivilege 1040 XClient.exe Token: SeDebugPrivilege 1768 FluxusV1.2 Token: SeDebugPrivilege 2076 FluxusV1.2 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1040 XClient.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1040 1720 XwormV5.3.exe 30 PID 1720 wrote to memory of 1040 1720 XwormV5.3.exe 30 PID 1720 wrote to memory of 1040 1720 XwormV5.3.exe 30 PID 1720 wrote to memory of 1972 1720 XwormV5.3.exe 31 PID 1720 wrote to memory of 1972 1720 XwormV5.3.exe 31 PID 1720 wrote to memory of 1972 1720 XwormV5.3.exe 31 PID 1040 wrote to memory of 2868 1040 XClient.exe 32 PID 1040 wrote to memory of 2868 1040 XClient.exe 32 PID 1040 wrote to memory of 2868 1040 XClient.exe 32 PID 1972 wrote to memory of 2896 1972 Xworm V5.6.exe 34 PID 1972 wrote to memory of 2896 1972 Xworm V5.6.exe 34 PID 1972 wrote to memory of 2896 1972 Xworm V5.6.exe 34 PID 1240 wrote to memory of 1768 1240 taskeng.exe 37 PID 1240 wrote to memory of 1768 1240 taskeng.exe 37 PID 1240 wrote to memory of 1768 1240 taskeng.exe 37 PID 1240 wrote to memory of 2076 1240 taskeng.exe 38 PID 1240 wrote to memory of 2076 1240 taskeng.exe 38 PID 1240 wrote to memory of 2076 1240 taskeng.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XwormV5.3.exe"C:\Users\Admin\AppData\Local\Temp\XwormV5.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\Admin\AppData\Roaming\FluxusV1.2"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
-
C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1972 -s 7323⤵PID:2896
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {802A4104-C117-4B2E-9B51-31B5467D3CAD} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\FluxusV1.2C:\Users\Admin\AppData\Roaming\FluxusV1.22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Users\Admin\AppData\Roaming\FluxusV1.2C:\Users\Admin\AppData\Roaming\FluxusV1.22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5acda38bc148d671863e1d32b577d7333
SHA16f9ed2412a759be9f23338da22a8c97e0617f6b4
SHA256107932c23964beddec38325b5a6cbb0af19d3a5f1419678d7ba5fbc6b858008c
SHA512535f3864b1b977cbf5dc1985632dbae418a3f135f4218ee3c407940cf25461f150634f2f23eb84840a77a1b7762e74ce9af15d3681d599d44a5e5191c37c0bb0
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1