Resubmissions

16-11-2024 22:11

241116-133emstras 10

Analysis

  • max time kernel
    126s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 22:11

General

  • Target

    XWorm-5.6.7z

  • Size

    39.5MB

  • MD5

    47dbba87313a28dd9fc539453def2600

  • SHA1

    75e0704809b47b2c5f4a24b2f319a8d6cc054456

  • SHA256

    9c63eaf9641e17748f12a732afb95f60273bee899102cfb414852af08b8413fd

  • SHA512

    1ce8073cda28a741b1e0269398c89f73dfb83675979210f6957832f27ee91d68e35291475da2a81a15c11b96e076440f03b8d4c78f3b4c5b4d585f14e943f9b2

  • SSDEEP

    786432:7wr253dsf++31wwoPTpjN55v3viFRboRpxaSEBaGEZ6pgbD+4aQ3Ny8D7sgKRte:k253dsW+3iJ5J3v6YpxH2EZAgbD+XQ8c

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1088
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1784
    • C:\Users\Admin\Desktop\XWorm-5.6\Xworm V5.6.exe
      "C:\Users\Admin\Desktop\XWorm-5.6\Xworm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4852
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1900
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x2f4 0x498
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zE044A2188\XWorm-5.6\.git\logs\refs\remotes\origin\HEAD

        Filesize

        171B

        MD5

        ffce61bfbb34f192c3601d3e3b41f523

        SHA1

        5b8d15b20d060888ab025df7a8675552d574c93b

        SHA256

        061e04d36165ad8a07b33ececb3a3d856b978c7fd4ead58b33f741eddd3595b2

        SHA512

        cbe56b1d948889f2c9b9a7bd5e8446628ffe3e2afea220ec37ffde1cb989f89ebd9f36369a5bbba3d6842d72b05f42e8b36e4ed028ae308158e6fe4adfb50f3e

      • C:\Users\Admin\AppData\Local\Temp\7zE044A2188\XWorm-5.6\Icons\icon (15).ico

        Filesize

        361KB

        MD5

        e3143e8c70427a56dac73a808cba0c79

        SHA1

        63556c7ad9e778d5bd9092f834b5cc751e419d16

        SHA256

        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

        SHA512

        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

      • C:\Users\Admin\Desktop\XWorm-5.6\GeoIP.dat

        Filesize

        1.2MB

        MD5

        8ef41798df108ce9bd41382c9721b1c9

        SHA1

        1e6227635a12039f4d380531b032bf773f0e6de0

        SHA256

        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

        SHA512

        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

      • C:\Users\Admin\Desktop\XWorm-5.6\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        bcc0fe2b28edd2da651388f84599059b

        SHA1

        44d7756708aafa08730ca9dbdc01091790940a4f

        SHA256

        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

        SHA512

        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

      • C:\Users\Admin\Desktop\XWorm-5.6\Sounds\Intro.wav

        Filesize

        238KB

        MD5

        ad3b4fae17bcabc254df49f5e76b87a6

        SHA1

        1683ff029eebaffdc7a4827827da7bb361c8747e

        SHA256

        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

        SHA512

        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

      • C:\Users\Admin\Desktop\XWorm-5.6\Xworm V5.6.exe

        Filesize

        14.9MB

        MD5

        56ccb739926a725e78a7acf9af52c4bb

        SHA1

        5b01b90137871c3c8f0d04f510c4d56b23932cbc

        SHA256

        90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

        SHA512

        2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

      • C:\Users\Admin\Desktop\XWorm-5.6\Xworm V5.6.exe.config

        Filesize

        183B

        MD5

        66f09a3993dcae94acfe39d45b553f58

        SHA1

        9d09f8e22d464f7021d7f713269b8169aed98682

        SHA256

        7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

        SHA512

        c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

      • memory/4852-303-0x00007FFFF6A80000-0x00007FFFF7541000-memory.dmp

        Filesize

        10.8MB

      • memory/4852-305-0x0000022652870000-0x0000022652A64000-memory.dmp

        Filesize

        2.0MB

      • memory/4852-306-0x00007FFFF6A83000-0x00007FFFF6A85000-memory.dmp

        Filesize

        8KB

      • memory/4852-302-0x00000226351D0000-0x00000226360B8000-memory.dmp

        Filesize

        14.9MB

      • memory/4852-308-0x00007FFFF6A80000-0x00007FFFF7541000-memory.dmp

        Filesize

        10.8MB

      • memory/4852-301-0x00007FFFF6A83000-0x00007FFFF6A85000-memory.dmp

        Filesize

        8KB