Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 19:57

General

  • Target

    XWorm V5.2.7z

  • Size

    28.8MB

  • MD5

    b965c5e95b3aa608de9bfc6af57df8ee

  • SHA1

    65dc4c9e615182565c60f1d20e297af4652605eb

  • SHA256

    07f410a24d31af2090a87ffd170bb0cb876aa1e735a754b1dbf50aa57a63a3bb

  • SHA512

    bd420b2f44aa9ca424332e6feca63072ac011fdf377dbfd73628c503452e3efcdb131bd6a4091d84aab0d7b3df3da2887bbf47be33eb44dccc9ee1dea3edf7f8

  • SSDEEP

    786432:5qVjpgbD+4a7wlwyYqmsN7tCUEFqkaUgTiJaqji3JVFuVbL:WgbD+XGKqmsNZmNgtIi5VFMP

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 19 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4456
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2036
    • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x32.exe
      "C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x32.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vdhmz0mw\vdhmz0mw.cmdline"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7F38.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDB867038BCE84FC580B2FD30E0DDE537.TMP"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3056
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2684
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x3d4 0x408
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zE86103B78\XWorm V5.2\Icons\icon (15).ico

        Filesize

        361KB

        MD5

        e3143e8c70427a56dac73a808cba0c79

        SHA1

        63556c7ad9e778d5bd9092f834b5cc751e419d16

        SHA256

        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

        SHA512

        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

      • C:\Users\Admin\AppData\Local\Temp\RES7F38.tmp

        Filesize

        1KB

        MD5

        e76b65a634d632732d989ae3a5127056

        SHA1

        ba17db2415fdf2be6df320d5a9dde84588f400db

        SHA256

        deab0b2e2e43b3d24010f97ba2d5f557023547fbf2e0a2518806ee6c46862b3b

        SHA512

        c2de77490be7b513430cdd23809d74c9b10a0268a47f8a33e1b11491bff7b2a0cab595595745ab7da29dc86df6496ada2e799fd49c8cff480620040cb7b5b737

      • C:\Users\Admin\AppData\Local\Temp\aPjMR\aPjMR.dll

        Filesize

        84KB

        MD5

        0b0e63957367e620b8697c5341af35b9

        SHA1

        69361c2762b2d1cada80667cd55bc5082e60af86

        SHA256

        bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5

        SHA512

        07d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee

      • C:\Users\Admin\AppData\Local\Temp\vbcDB867038BCE84FC580B2FD30E0DDE537.TMP

        Filesize

        1KB

        MD5

        d40c58bd46211e4ffcbfbdfac7c2bb69

        SHA1

        c5cf88224acc284a4e81bd612369f0e39f3ac604

        SHA256

        01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

        SHA512

        48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

      • C:\Users\Admin\AppData\Local\Temp\vdhmz0mw\vdhmz0mw.0.vb

        Filesize

        77KB

        MD5

        917b9f5c15294644e859512339d8539d

        SHA1

        013f50ab5a1f829cb117f7b143986e39d2827fda

        SHA256

        774db27cf5b1f69dd9bc30ee8454d88b52b107d118d9a176515c726c559a90e2

        SHA512

        dafdf5ccd9be9ef77dcd46bf0b58f044200d772d13f83cca14d0d2e053da6c53f2191f276d07b6f2307817cabb0aed7a8ed932c6edd18069fda84e92efb63a8e

      • C:\Users\Admin\AppData\Local\Temp\vdhmz0mw\vdhmz0mw.cmdline

        Filesize

        290B

        MD5

        9b52429adb2aaadf7e2ba2f948d064bd

        SHA1

        02ed2013ee21ee716c837ce3ebc9f0829a3d1312

        SHA256

        ff215a73fa39a2f1e6be80d64ebc66db9a0a9fd874d54dc5b11f8165dd92cd03

        SHA512

        60b5e1c4ecb481759a25537a136a61e0eb8bb7960ea898f34429a41b977a3bd3ae3605aa6705f72a9c30cbdf217d484b86748af4eaaab736e1ec50a8d0caf5d9

      • C:\Users\Admin\Desktop\XWorm V5.2\GeoIP.dat

        Filesize

        1.2MB

        MD5

        8ef41798df108ce9bd41382c9721b1c9

        SHA1

        1e6227635a12039f4d380531b032bf773f0e6de0

        SHA256

        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

        SHA512

        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

      • C:\Users\Admin\Desktop\XWorm V5.2\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        bcc0fe2b28edd2da651388f84599059b

        SHA1

        44d7756708aafa08730ca9dbdc01091790940a4f

        SHA256

        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

        SHA512

        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

      • C:\Users\Admin\Desktop\XWorm V5.2\Mono.Cecil.dll

        Filesize

        350KB

        MD5

        de69bb29d6a9dfb615a90df3580d63b1

        SHA1

        74446b4dcc146ce61e5216bf7efac186adf7849b

        SHA256

        f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

        SHA512

        6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Backports.dll

        Filesize

        138KB

        MD5

        dd43356f07fc0ce082db4e2f102747a2

        SHA1

        aa0782732e2d60fa668b0aadbf3447ef70b6a619

        SHA256

        e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

        SHA512

        284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Core.dll

        Filesize

        216KB

        MD5

        b808181453b17f3fc1ab153bf11be197

        SHA1

        bce86080b7eb76783940d1ff277e2b46f231efe9

        SHA256

        da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

        SHA512

        a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.ILHelpers.dll

        Filesize

        6KB

        MD5

        6512e89e0cb92514ef24be43f0bf4500

        SHA1

        a039c51f89656d9d5c584f063b2b675a9ff44b8e

        SHA256

        1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

        SHA512

        9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

      • C:\Users\Admin\Desktop\XWorm V5.2\MonoMod.Utils.dll

        Filesize

        319KB

        MD5

        79f1c4c312fdbb9258c2cdde3772271f

        SHA1

        a143434883e4ef2c0190407602b030f5c4fdf96f

        SHA256

        f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

        SHA512

        b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

      • C:\Users\Admin\Desktop\XWorm V5.2\RVGLib.dll

        Filesize

        241KB

        MD5

        d34c13128c6c7c93af2000a45196df81

        SHA1

        664c821c9d2ed234aea31d8b4f17d987e4b386f1

        SHA256

        aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

        SHA512

        91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

      • C:\Users\Admin\Desktop\XWorm V5.2\SimpleObfuscator.dll

        Filesize

        1.4MB

        MD5

        9043d712208178c33ba8e942834ce457

        SHA1

        e0fa5c730bf127a33348f5d2a5673260ae3719d1

        SHA256

        b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

        SHA512

        dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

      • C:\Users\Admin\Desktop\XWorm V5.2\Sounds\Intro.wav

        Filesize

        238KB

        MD5

        ad3b4fae17bcabc254df49f5e76b87a6

        SHA1

        1683ff029eebaffdc7a4827827da7bb361c8747e

        SHA256

        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

        SHA512

        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

      • C:\Users\Admin\Desktop\XWorm V5.2\XWorm V5.2.exe

        Filesize

        12.2MB

        MD5

        8b7b015c1ea809f5c6ade7269bdc5610

        SHA1

        c67d5d83ca18731d17f79529cfdb3d3dcad36b96

        SHA256

        7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

        SHA512

        e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

      • C:\Users\Admin\Desktop\XWorm V5.2\XWorm V5.2.exe.Config

        Filesize

        183B

        MD5

        66f09a3993dcae94acfe39d45b553f58

        SHA1

        9d09f8e22d464f7021d7f713269b8169aed98682

        SHA256

        7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

        SHA512

        c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

      • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x32.exe

        Filesize

        109KB

        MD5

        f3b2ec58b71ba6793adcc2729e2140b1

        SHA1

        d9e93a33ac617afe326421df4f05882a61e0a4f2

        SHA256

        2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae

        SHA512

        473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495

      • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x32.exe.config

        Filesize

        187B

        MD5

        15c8c4ba1aa574c0c00fd45bb9cce1ab

        SHA1

        0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

        SHA256

        f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

        SHA512

        52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

      • C:\Users\Admin\Desktop\XWorm V5.2\XWormLoader 5.2 x64.exe

        Filesize

        109KB

        MD5

        e6a20535b636d6402164a8e2d871ef6d

        SHA1

        981cb1fd9361ca58f8985104e00132d1836a8736

        SHA256

        b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

        SHA512

        35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

      • memory/868-211-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-231-0x00000000753BE000-0x00000000753BF000-memory.dmp

        Filesize

        4KB

      • memory/868-203-0x0000000005F60000-0x0000000005F7A000-memory.dmp

        Filesize

        104KB

      • memory/868-210-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-212-0x0000000006BF0000-0x0000000007828000-memory.dmp

        Filesize

        12.2MB

      • memory/868-202-0x0000000005EF0000-0x0000000005F2C000-memory.dmp

        Filesize

        240KB

      • memory/868-213-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-214-0x0000000007830000-0x0000000007DD4000-memory.dmp

        Filesize

        5.6MB

      • memory/868-215-0x0000000006210000-0x00000000062A2000-memory.dmp

        Filesize

        584KB

      • memory/868-198-0x0000000005E60000-0x0000000005E66000-memory.dmp

        Filesize

        24KB

      • memory/868-222-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-223-0x000000000B120000-0x000000000BD0C000-memory.dmp

        Filesize

        11.9MB

      • memory/868-224-0x0000000003190000-0x000000000319A000-memory.dmp

        Filesize

        40KB

      • memory/868-225-0x0000000006B00000-0x0000000006B56000-memory.dmp

        Filesize

        344KB

      • memory/868-197-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-229-0x000000000C710000-0x000000000C904000-memory.dmp

        Filesize

        2.0MB

      • memory/868-230-0x000000000EF20000-0x000000000EF86000-memory.dmp

        Filesize

        408KB

      • memory/868-204-0x0000000005F30000-0x0000000005F40000-memory.dmp

        Filesize

        64KB

      • memory/868-232-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-233-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-234-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-235-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-236-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-237-0x00000000753B0000-0x0000000075B60000-memory.dmp

        Filesize

        7.7MB

      • memory/868-196-0x0000000005E20000-0x0000000005E26000-memory.dmp

        Filesize

        24KB

      • memory/868-195-0x0000000005DC0000-0x0000000005E16000-memory.dmp

        Filesize

        344KB

      • memory/868-191-0x0000000005D60000-0x0000000005DBE000-memory.dmp

        Filesize

        376KB

      • memory/868-187-0x0000000005C00000-0x0000000005C06000-memory.dmp

        Filesize

        24KB

      • memory/868-183-0x0000000005C30000-0x0000000005C58000-memory.dmp

        Filesize

        160KB

      • memory/868-247-0x0000000019ED0000-0x000000001A038000-memory.dmp

        Filesize

        1.4MB

      • memory/868-179-0x0000000005CC0000-0x0000000005D5C000-memory.dmp

        Filesize

        624KB

      • memory/868-178-0x00000000057B0000-0x00000000057F2000-memory.dmp

        Filesize

        264KB

      • memory/868-174-0x0000000000270000-0x0000000000290000-memory.dmp

        Filesize

        128KB

      • memory/868-173-0x00000000753BE000-0x00000000753BF000-memory.dmp

        Filesize

        4KB