Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 18:27
Behavioral task
behavioral1
Sample
xworm v5.6.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
xworm v5.6.exe
-
Size
112KB
-
MD5
26dc5b4b6ebc5278f0b06537d59a415b
-
SHA1
a9df7ccf50768979c6f2828265ad1992fd6526fa
-
SHA256
de78531cc0db12e7733944aaa39131e3201336799b57645c07c8b07c594539d3
-
SHA512
729bb095fdc9beb4de217cc80bc7ecfd29e8b799bf170242ceaaa9ff369868fe5160865511fe85a8fda42b4432b6afcf0b7487ace2cd1735f1ab7275caa53b6a
-
SSDEEP
3072:qIBWqjPVbq0h3Xi/O0U+FY7fgAdoheNS:qaHjPVbq0VO5vEN
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:43897
Attributes
-
Install_directory
%LocalAppData%
-
install_file
xworm v5.6.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4032-1-0x0000000000B90000-0x0000000000BB2000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4032 xworm v5.6.exe Token: SeDebugPrivilege 4212 taskmgr.exe Token: SeSystemProfilePrivilege 4212 taskmgr.exe Token: SeCreateGlobalPrivilege 4212 taskmgr.exe Token: 33 4212 taskmgr.exe Token: SeIncBasePriorityPrivilege 4212 taskmgr.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe 4212 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xworm v5.6.exe"C:\Users\Admin\AppData\Local\Temp\xworm v5.6.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4212