Analysis
-
max time kernel
48s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:29
Behavioral task
behavioral1
Sample
xworm v5.6.zip
Resource
win10v2004-20241007-en
General
-
Target
xworm v5.6.zip
-
Size
25.7MB
-
MD5
9be2c49c6bed9d51189728daab37a9d6
-
SHA1
edb74399d10f0b27a1b9b04338c949a40f160f50
-
SHA256
ee0f06fe5a237021d53f3b8ce7bc05e0e13ed01957e38a572655f89e285a004b
-
SHA512
32e48fba21b18fbba4de9abea6df2f5bcc949c2951276bdec20c5ae645b4008ca77942cacd48f38e6e47350cafe19dc3d007d9c4ebdf62c473f8c8e32e5b5814
-
SSDEEP
786432:fvngbHGxuMHpxbCHBQu0RZhXg1wc4URZV6bQ:HgbHGxLCHyjPhKsUvSQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3144 Xworm V5.6.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe 3144 Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Xworm V5.6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3232 7zFM.exe Token: 35 3232 7zFM.exe Token: SeSecurityPrivilege 3232 7zFM.exe Token: 33 4324 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4324 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3232 7zFM.exe 3232 7zFM.exe 3144 Xworm V5.6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3144 Xworm V5.6.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\xworm v5.6.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2896
-
C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe"C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3144
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2904
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d4 0x4e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
15.9MB
MD55e0b1328f758a37efd3dd6f03152ee67
SHA12cf00690e9c0455a0bc96913a048ea877c5098fc
SHA2561ce1b9ce870b58e478f1b670302cc1ea447bd86f9195a90479ae6e688a3c85fb
SHA512385bfac3568305d838910cfd4ff316635a0cad75156a15ba4d57e11c4a17fcf40dbb23b6252a0a9de7c480fb755293c6a4843ba0ce062bbdfc9fce4f9d0528d9
-
Filesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed