Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 19:46

General

  • Target

    0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe

  • Size

    100KB

  • MD5

    e56c93a71f5733ebc322a33658d19822

  • SHA1

    dbfc91851cffa4dcc8ef2bd394f14e7e9d3da139

  • SHA256

    0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633

  • SHA512

    edc74826f32c148484509af0e4b8f55d66e16b10cb52d0ec2c43342d215ecee873fba7a56a8f2b43d133d2057e273d70b60d44e1fcf5376733a666bc701a859f

  • SSDEEP

    1536:bEOwgFowSgnVVVHzExnAdgVxDSMnEiqIYdfi/GExtulSpn:4rwanDVxjqdIntulS

Malware Config

Extracted

Family

xworm

Version

3.1

C2

127.0.0.1:7000

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe
    "C:\Users\Admin\AppData\Local\Temp\0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\0.dll
      C:\Users\Admin\AppData\Local\Temp\0.dll
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\0.dll

    Filesize

    54KB

    MD5

    b7fd5ed6cad1d30f3f85ccca261c8881

    SHA1

    a53a7eb56898a4d7bddbb67e0e98395ec4e3a4cd

    SHA256

    651c210acb91494cf0998e7d80c4208f990bec4749af2fb0a3898021db650935

    SHA512

    983b8b50501ab58a79a927e41aaa5298e42e5564eafafb36fb701a735c818df5b79fd16b3345791abd399cfbc1185d80ebc663bf8e34b05f9a87240506cdcd89

  • memory/1148-7-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/1148-8-0x00000000002E0000-0x00000000002F4000-memory.dmp

    Filesize

    80KB

  • memory/1148-9-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/1148-10-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/1148-11-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB