Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
3d3459b0630ce9dc45b177b697ca23a0
-
SHA1
0245c62e5155dd121bd3b31af02e5bf62bb01e71
-
SHA256
40d07a9b787d52381da6ce75c088f62eb009baffd98858660670715976ad7cc5
-
SHA512
2016ada15909d95c7518cf8f803f1ecd05c8f1d1325be1e8c2ac3c7e5b24e9da58dccef9ac7e978e660bbe4f93096d2e483f84ac8b088d72e119b76f2f4d56b9
-
SSDEEP
24576:2/vN2wSUb01BxVVZCfQ7jnOqBpoZk7g8Ll4LMhrsyPBUj8Zpn9BxjZVpTyGZI2:2/l28QjxVCfszOqB6ZB2P1TVTRyGB
Malware Config
Extracted
xworm
5.0
127.0.0.1:8895
162.230.48.189:8895
ZRGtN7NDh24Vx89x
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2116-2197-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1832 created 3448 1832 file.exe 56 PID 4436 created 3448 4436 RegAsm.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cdvayh.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ContextID.vbs file.exe -
Executes dropped EXE 2 IoCs
pid Process 4036 xnhufh.exe 1016 cdvayh.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1832 set thread context of 1476 1832 file.exe 100 PID 1476 set thread context of 4436 1476 InstallUtil.exe 112 PID 4436 set thread context of 2116 4436 RegAsm.exe 118 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdvayh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2044 timeout.exe -
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 2184 ipconfig.exe 2588 ipconfig.exe 1328 ipconfig.exe 4808 ipconfig.exe 5228 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1476 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1832 file.exe 1832 file.exe 1832 file.exe 1832 file.exe 1832 file.exe 4436 RegAsm.exe 4436 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1832 file.exe Token: SeDebugPrivilege 1832 file.exe Token: SeDebugPrivilege 1476 InstallUtil.exe Token: SeDebugPrivilege 4436 RegAsm.exe Token: SeDebugPrivilege 4436 RegAsm.exe Token: SeDebugPrivilege 2116 InstallUtil.exe Token: SeDebugPrivilege 1016 cdvayh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 3884 1832 file.exe 88 PID 1832 wrote to memory of 3884 1832 file.exe 88 PID 1832 wrote to memory of 3884 1832 file.exe 88 PID 3884 wrote to memory of 2184 3884 cmd.exe 90 PID 3884 wrote to memory of 2184 3884 cmd.exe 90 PID 3884 wrote to memory of 2184 3884 cmd.exe 90 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 1476 1832 file.exe 100 PID 1832 wrote to memory of 3756 1832 file.exe 101 PID 1832 wrote to memory of 3756 1832 file.exe 101 PID 1832 wrote to memory of 3756 1832 file.exe 101 PID 3756 wrote to memory of 2588 3756 cmd.exe 103 PID 3756 wrote to memory of 2588 3756 cmd.exe 103 PID 3756 wrote to memory of 2588 3756 cmd.exe 103 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 1476 wrote to memory of 4436 1476 InstallUtil.exe 112 PID 4436 wrote to memory of 2400 4436 RegAsm.exe 113 PID 4436 wrote to memory of 2400 4436 RegAsm.exe 113 PID 4436 wrote to memory of 2400 4436 RegAsm.exe 113 PID 2400 wrote to memory of 1328 2400 cmd.exe 115 PID 2400 wrote to memory of 1328 2400 cmd.exe 115 PID 2400 wrote to memory of 1328 2400 cmd.exe 115 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 2116 4436 RegAsm.exe 118 PID 4436 wrote to memory of 1864 4436 RegAsm.exe 119 PID 4436 wrote to memory of 1864 4436 RegAsm.exe 119 PID 4436 wrote to memory of 1864 4436 RegAsm.exe 119 PID 1864 wrote to memory of 4808 1864 cmd.exe 121 PID 1864 wrote to memory of 4808 1864 cmd.exe 121 PID 1864 wrote to memory of 4808 1864 cmd.exe 121 PID 2116 wrote to memory of 4036 2116 InstallUtil.exe 132 PID 2116 wrote to memory of 4036 2116 InstallUtil.exe 132 PID 2116 wrote to memory of 1016 2116 InstallUtil.exe 133 PID 2116 wrote to memory of 1016 2116 InstallUtil.exe 133 PID 2116 wrote to memory of 1016 2116 InstallUtil.exe 133 PID 2116 wrote to memory of 2752 2116 InstallUtil.exe 134 PID 2116 wrote to memory of 2752 2116 InstallUtil.exe 134 PID 2116 wrote to memory of 2752 2116 InstallUtil.exe 134 PID 2752 wrote to memory of 2044 2752 cmd.exe 136 PID 2752 wrote to memory of 2044 2752 cmd.exe 136 PID 2752 wrote to memory of 2044 2752 cmd.exe 136 PID 1016 wrote to memory of 5172 1016 cdvayh.exe 137 PID 1016 wrote to memory of 5172 1016 cdvayh.exe 137 PID 1016 wrote to memory of 5172 1016 cdvayh.exe 137 PID 5172 wrote to memory of 5228 5172 cmd.exe 139 PID 5172 wrote to memory of 5228 5172 cmd.exe 139
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2588
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4808
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\xnhufh.exe"C:\Users\Admin\AppData\Local\Temp\xnhufh.exe"3⤵
- Executes dropped EXE
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\cdvayh.exe"C:\Users\Admin\AppData\Local\Temp\cdvayh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5172 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5228
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD363.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d5a658bf1ba47c2197602adaf3ccf35e
SHA15a5d81ac2da7dd8e7963a9a6ae50ca211cccc6e2
SHA256ce4ebe3b66b980a093838aa814fbf48aef7e1e4a2fe6b88a09608f3d628a88e6
SHA512eb2772e21f2392aede06e17b9411c16f2bfb4e13d5c50b0bdeec72d5b644897831238679c1f11eb4add58d00c5112613d886eeaa3df7fb0d97949c080b8bd7e5
-
Filesize
175B
MD5d7d92dbe9e1bb75dcbbed4ff47ad32fd
SHA1da92431d25d48b3a894a26311a68a0c96631d3df
SHA2566c1d9b68366f483da9cc7f7552c34f02be29dcc914f7105b88a5151647072208
SHA51283fb4fee46ac8716d5ea50e2cce151a2a0261bef06c24fbe3a0fb0b5a85ed934cd037b737673e14f582d5bf3de0287be3347625b62ee3dc34bd87bc1b5f94b5a
-
Filesize
5.3MB
MD573a56908097ee57dd4217877aeae4641
SHA1a41cc3570f40f9688b2ac9f5e7326150a3a350a6
SHA256fde56e00761a85ad495bd2d05654f3657922f665f58edfabcf43d2fa769f0d79
SHA512930ba7d57f250b5c9e020c0265db9376d0675bfcafb7c5c5e292add319ec2942a9f2b5286f997e406e7f1effb8e1029649a5141cd7ad032f4b75a77e51259c67