Analysis

  • max time kernel
    1119s
  • max time network
    1153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:10

General

  • Target

    XWorm V5.6.7z

  • Size

    20.3MB

  • MD5

    53c8043d0214e8406e0aca1febb87689

  • SHA1

    30619cef6b50395f73ba561ec6a4746b4c215b6c

  • SHA256

    e1aad6f75f7137d31bc3863c66ca49d1e730b63e5419b7aeef9ff2fbd178e9ca

  • SHA512

    22224bc83cc97f6bba03f544152479964214363ed6d8c36637ad8325065069cd9bbbb64829d4b650a3342e8c34fbcc932c362697fdacb60eb8d0685641d489fc

  • SSDEEP

    393216:7qKeYOG5obdpgrFXNDVE4cnsF/v3J3UaAi+RMmB1z7tKccsiKjv4zdw:7qVYORBpgbD+4aQ3NyAmHvAdw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2376
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4760
    • C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe
      "C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3472
    • C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe
      "C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zE849C4DF8\XWorm V5.6\Icons\icon (15).ico

      Filesize

      361KB

      MD5

      e3143e8c70427a56dac73a808cba0c79

      SHA1

      63556c7ad9e778d5bd9092f834b5cc751e419d16

      SHA256

      b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

      SHA512

      74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

    • C:\Users\Admin\Desktop\XWorm V5.6\XWorm V5.6.exe

      Filesize

      14.5MB

      MD5

      375b7ea689e3e9f18a3dfa79e9434dea

      SHA1

      acdcda09495cb229055a51bf3735deeea0a5ee47

      SHA256

      002c3faf9e644e14fb67309e9cfec28bdc9ce20c25424ffbf3b5a6b6a10407a3

      SHA512

      202bc3e7ce74fde2d4364f4da1e2321bdbb0de364e3b06201a282c39f57e01d02248ebe23045a8f54fcdc19a697dd57e60020921bda70ab82d09fe8a0af8238d

    • memory/3472-240-0x00007FF9E1173000-0x00007FF9E1175000-memory.dmp

      Filesize

      8KB

    • memory/3472-241-0x0000000000CB0000-0x0000000001450000-memory.dmp

      Filesize

      7.6MB

    • memory/3472-242-0x00007FF9E1170000-0x00007FF9E1C31000-memory.dmp

      Filesize

      10.8MB

    • memory/3472-243-0x00007FF9E1170000-0x00007FF9E1C31000-memory.dmp

      Filesize

      10.8MB