Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2024 22:25

General

  • Target

    7245244c75276269f56cce5f81194681a881d4746a7abec6807f28a19b04ba66.exe

  • Size

    703KB

  • MD5

    951a32aa2dc318f958f6343a90520b9a

  • SHA1

    c54777ef2b539737582b700935beb4d09da9eaf2

  • SHA256

    7245244c75276269f56cce5f81194681a881d4746a7abec6807f28a19b04ba66

  • SHA512

    25fade9e618fc12220863fea258cb9b00ea6e3459c5d66e0951b3ee8d846fb33259160d1b826f58589c003593961652ecaaf252aadbeaf5371f8ee888a211547

  • SSDEEP

    12288:vp4ZLalVqAJVLBNAliYOapsNlW3R5rad8pz4U1tF5qBsy7BnX+uUnsAS:v+Z2/rJjNAliYOBMrE8GUaBsyNXmF

Malware Config

Extracted

Family

xworm

Version

5.0

C2

87.120.117.209:7000

Mutex

U2y4hALpuDGJOJr0

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7245244c75276269f56cce5f81194681a881d4746a7abec6807f28a19b04ba66.exe
    "C:\Users\Admin\AppData\Local\Temp\7245244c75276269f56cce5f81194681a881d4746a7abec6807f28a19b04ba66.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Roaming\05Uf2YqIpF.exe
      "C:\Users\Admin\AppData\Roaming\05Uf2YqIpF.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\05Uf2YqIpF.exe

    Filesize

    32KB

    MD5

    85d9338ae7f8665821638125a394cb4f

    SHA1

    269be255f238e7be7e4976204b6605ee069e55d9

    SHA256

    a1c97fe85170fd6acd766d965f1931e32692ffa92db222492fd24b4421b126c9

    SHA512

    3b66e2f2893ef61a5acf2e21f2d216bb0da18e54a1f1f06eba8167f71e1ee7c1a1efa208f625f5c82dfd4c391ba3b89b545adffc9baddde84fccf95872fe9d45

  • memory/2784-9-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmp

    Filesize

    4KB

  • memory/2784-10-0x00000000001D0000-0x00000000001DE000-memory.dmp

    Filesize

    56KB

  • memory/2784-11-0x000007FEF5E20000-0x000007FEF680C000-memory.dmp

    Filesize

    9.9MB

  • memory/2784-12-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmp

    Filesize

    4KB

  • memory/2784-13-0x000007FEF5E20000-0x000007FEF680C000-memory.dmp

    Filesize

    9.9MB