General
-
Target
msedge_visual_render.exe
-
Size
188KB
-
Sample
241115-zysh7swkeq
-
MD5
e796b778b392f06de4d340ec0f88b4cc
-
SHA1
32561bf3b022aef8a62bac3e820ef7e3bc648f57
-
SHA256
1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05
-
SHA512
dcdbeb8d1720b2bfe8ce8c2311414b71ec090eb94db53d379c08cbf7b17a25ac4bc9488315e867406bb1661a76df223c953f01c7d40997fdf9ccb20daaf4c8c7
-
SSDEEP
3072:2rhv4AbmL4mkbrz9EO7PvJKRUGKXs+S++7KFSbxeY+qDDrMn:2r7bmclbX3ZGqStKEbxI
Behavioral task
behavioral1
Sample
msedge_visual_render.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msedge_visual_render.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
msedge_visual_render.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:57660
-
Install_directory
%AppData%
-
install_file
msedge.exe
Targets
-
-
Target
msedge_visual_render.exe
-
Size
188KB
-
MD5
e796b778b392f06de4d340ec0f88b4cc
-
SHA1
32561bf3b022aef8a62bac3e820ef7e3bc648f57
-
SHA256
1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05
-
SHA512
dcdbeb8d1720b2bfe8ce8c2311414b71ec090eb94db53d379c08cbf7b17a25ac4bc9488315e867406bb1661a76df223c953f01c7d40997fdf9ccb20daaf4c8c7
-
SSDEEP
3072:2rhv4AbmL4mkbrz9EO7PvJKRUGKXs+S++7KFSbxeY+qDDrMn:2r7bmclbX3ZGqStKEbxI
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-