Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 07:39

General

  • Target

    KING WEAPON.exe

  • Size

    653KB

  • MD5

    0c873d832bcfb08d023fca6ebe0e22de

  • SHA1

    0b18147315d176ed302ce2a3af814ad630831302

  • SHA256

    ebae2bd3c854a82d65b0db827fff81940e4a5876c9a536a7612fa3bedb38480a

  • SHA512

    1309e69d1ca57643946528b7747d40b5b2ab3f9c7c29168470afb690983813f8bf981a72f4e5f5ddd81260594ef3c8e37753eea13d75905b7c7e49db049faaf8

  • SSDEEP

    12288:+Vq3hWyjefPaWZE/sNG2c64EvUOMW2UgSgaMDOH8ogiSkXsXBhOdaEoIwEb59pJB:k7yjeHcr9O+O

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

client-toilet.gl.at.ply.gg:29921

Mutex

NvsfH1XO1syyGREn

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KING WEAPON.exe
    "C:\Users\Admin\AppData\Local\Temp\KING WEAPON.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe
      "C:\Users\Admin\AppData\Local\Temp\ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\system32\cmd.exe
        "cmd.exe"
        3⤵
          PID:1484
        • C:\Windows\system32\cmd.exe
          "cmd.exe"
          3⤵
            PID:2120
          • C:\Windows\system32\cmd.exe
            "cmd.exe"
            3⤵
              PID:3020
            • C:\Windows\system32\cmd.exe
              "cmd.exe"
              3⤵
                PID:2212
            • C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe
              "C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2932

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe

            Filesize

            67KB

            MD5

            2b1bcff698482a45a0d01356ad3e0384

            SHA1

            77d106b1495b869600cdfda6afeaec0f75a78634

            SHA256

            a9bd5014b5a6744b0a5c180a3e76ff546a514dcbad8bf2d8c500f903a285424b

            SHA512

            e8b6a729f3b4fc02886aeed232511dc9407a52aae40f01cd2817f8369944b14240bd3edfd573dbdef0d506557f02622148ce4042f6f497c20f1f11af85eeac77

          • \Users\Admin\AppData\Local\Temp\ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe

            Filesize

            1.8MB

            MD5

            571bb5e3f78c76c7dd43278ca1e53fb9

            SHA1

            821eb31c4d1cb4403354c5bf4c0fedbdb26c3f09

            SHA256

            9397aa1401b570445268ec8f95816e1cd4ccb9937e90645e2f5b5630bbd4fb26

            SHA512

            43b4c93c87fdec905e826cfead9cf7ff4b138ee077b1ff3d3314f5b12c617b6c322933650d168ece76b47b4d2f8300dd25022addd1b2c3fb7edfbd2110f84b6f

          • memory/1668-0-0x000007FEF60D3000-0x000007FEF60D4000-memory.dmp

            Filesize

            4KB

          • memory/1668-1-0x0000000000CB0000-0x0000000000D5A000-memory.dmp

            Filesize

            680KB

          • memory/1668-15-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/2040-14-0x000000013F3A0000-0x000000013F56C000-memory.dmp

            Filesize

            1.8MB

          • memory/2932-13-0x0000000001090000-0x00000000010A6000-memory.dmp

            Filesize

            88KB

          • memory/2932-16-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/2932-19-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

            Filesize

            9.9MB