Analysis
-
max time kernel
1815s -
max time network
1817s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 01:10
Behavioral task
behavioral1
Sample
XWorm V5.6.7z
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XWorm V5.6.7z
Resource
win10v2004-20241007-en
General
-
Target
XWorm V5.6.7z
-
Size
20.3MB
-
MD5
53c8043d0214e8406e0aca1febb87689
-
SHA1
30619cef6b50395f73ba561ec6a4746b4c215b6c
-
SHA256
e1aad6f75f7137d31bc3863c66ca49d1e730b63e5419b7aeef9ff2fbd178e9ca
-
SHA512
22224bc83cc97f6bba03f544152479964214363ed6d8c36637ad8325065069cd9bbbb64829d4b650a3342e8c34fbcc932c362697fdacb60eb8d0685641d489fc
-
SSDEEP
393216:7qKeYOG5obdpgrFXNDVE4cnsF/v3J3UaAi+RMmB1z7tKccsiKjv4zdw:7qVYORBpgbD+4aQ3NyAmHvAdw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
XWorm V5.6.exeXWorm V5.6.exepid process 2712 XWorm V5.6.exe 2576 XWorm V5.6.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com 7 ip-api.com -
Processes:
helppane.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main helppane.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2644 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
7zFM.exeXWorm V5.6.exeXWorm V5.6.exehelppane.exedescription pid process Token: SeRestorePrivilege 2644 7zFM.exe Token: 35 2644 7zFM.exe Token: SeSecurityPrivilege 2644 7zFM.exe Token: SeDebugPrivilege 2712 XWorm V5.6.exe Token: SeDebugPrivilege 2576 XWorm V5.6.exe Token: SeTakeOwnershipPrivilege 2628 helppane.exe Token: SeTakeOwnershipPrivilege 2628 helppane.exe Token: SeTakeOwnershipPrivilege 2628 helppane.exe Token: SeTakeOwnershipPrivilege 2628 helppane.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7zFM.exehelppane.exepid process 2644 7zFM.exe 2644 7zFM.exe 2628 helppane.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
helppane.exepid process 2628 helppane.exe 2628 helppane.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2644
-
C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
14.5MB
MD5375b7ea689e3e9f18a3dfa79e9434dea
SHA1acdcda09495cb229055a51bf3735deeea0a5ee47
SHA256002c3faf9e644e14fb67309e9cfec28bdc9ce20c25424ffbf3b5a6b6a10407a3
SHA512202bc3e7ce74fde2d4364f4da1e2321bdbb0de364e3b06201a282c39f57e01d02248ebe23045a8f54fcdc19a697dd57e60020921bda70ab82d09fe8a0af8238d