Analysis

  • max time kernel
    48s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 16:29

General

  • Target

    xworm v5.6.zip

  • Size

    25.7MB

  • MD5

    9be2c49c6bed9d51189728daab37a9d6

  • SHA1

    edb74399d10f0b27a1b9b04338c949a40f160f50

  • SHA256

    ee0f06fe5a237021d53f3b8ce7bc05e0e13ed01957e38a572655f89e285a004b

  • SHA512

    32e48fba21b18fbba4de9abea6df2f5bcc949c2951276bdec20c5ae645b4008ca77942cacd48f38e6e47350cafe19dc3d007d9c4ebdf62c473f8c8e32e5b5814

  • SSDEEP

    786432:fvngbHGxuMHpxbCHBQu0RZhXg1wc4URZV6bQ:HgbHGxLCHyjPhKsUvSQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\xworm v5.6.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3232
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2896
    • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe
      "C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3144
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2904
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x3d4 0x4e4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zE0ACE0F87\xworm v5.6\xworm v5.6\xworm v5.6\Icons\icon (15).ico

        Filesize

        361KB

        MD5

        e3143e8c70427a56dac73a808cba0c79

        SHA1

        63556c7ad9e778d5bd9092f834b5cc751e419d16

        SHA256

        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

        SHA512

        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

      • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\GeoIP.dat

        Filesize

        1.2MB

        MD5

        8ef41798df108ce9bd41382c9721b1c9

        SHA1

        1e6227635a12039f4d380531b032bf773f0e6de0

        SHA256

        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

        SHA512

        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

      • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        bcc0fe2b28edd2da651388f84599059b

        SHA1

        44d7756708aafa08730ca9dbdc01091790940a4f

        SHA256

        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

        SHA512

        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

      • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Sounds\Intro.wav

        Filesize

        238KB

        MD5

        ad3b4fae17bcabc254df49f5e76b87a6

        SHA1

        1683ff029eebaffdc7a4827827da7bb361c8747e

        SHA256

        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

        SHA512

        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

      • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe

        Filesize

        15.9MB

        MD5

        5e0b1328f758a37efd3dd6f03152ee67

        SHA1

        2cf00690e9c0455a0bc96913a048ea877c5098fc

        SHA256

        1ce1b9ce870b58e478f1b670302cc1ea447bd86f9195a90479ae6e688a3c85fb

        SHA512

        385bfac3568305d838910cfd4ff316635a0cad75156a15ba4d57e11c4a17fcf40dbb23b6252a0a9de7c480fb755293c6a4843ba0ce062bbdfc9fce4f9d0528d9

      • C:\Users\Admin\Desktop\xworm v5.6\xworm v5.6\xworm v5.6\Xworm V5.6.exe.config

        Filesize

        183B

        MD5

        66f09a3993dcae94acfe39d45b553f58

        SHA1

        9d09f8e22d464f7021d7f713269b8169aed98682

        SHA256

        7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

        SHA512

        c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

      • memory/3144-145-0x00007FF9898A3000-0x00007FF9898A5000-memory.dmp

        Filesize

        8KB

      • memory/3144-146-0x0000022193E40000-0x000002219692A000-memory.dmp

        Filesize

        42.9MB

      • memory/3144-147-0x00000221B1000000-0x00000221B1C2E000-memory.dmp

        Filesize

        12.2MB

      • memory/3144-149-0x00000221B1E30000-0x00000221B2024000-memory.dmp

        Filesize

        2.0MB

      • memory/3144-150-0x00007FF9898A3000-0x00007FF9898A5000-memory.dmp

        Filesize

        8KB