Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
XwormLoader.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
XwormLoader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XwormLoader.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
XwormLoader.exe
-
Size
7.9MB
-
MD5
5b757c6d0af650a77ba1bf7edea18b36
-
SHA1
c2ee4e12ff4b70511dbcab25dbf8b0d45f2d52b3
-
SHA256
c2a9fefda9159dd2712510c1c9077a1885d0ebc45251285dad95ba7184b98856
-
SHA512
93ca04887c63c3a0a4a5d42c48d0f4f7cc7fe7f6dad4dd45136ac048639d2edab66a2d2459779b9a2a075fa8981ea40567b34e5ed0535c1deecfe5e838385960
-
SSDEEP
196608:T7b4C6XrL5HfZBEhl3xZi5OslC9+PWbXooVl41u1mMFsr5:T7yvRZBEP3xZi5Oso+PWbXooL4Sa
Malware Config
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral4/files/0x000600000002a868-12.dat family_xworm behavioral4/memory/3264-20-0x0000000000B60000-0x0000000000B8A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 664 powershell.exe 3332 powershell.exe 2284 powershell.exe 2680 powershell.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral4/files/0x000600000002a868-12.dat net_reactor behavioral4/memory/3264-20-0x0000000000B60000-0x0000000000B8A000-memory.dmp net_reactor -
Executes dropped EXE 4 IoCs
pid Process 3264 svchost.exe 2676 Xworm V5.6.exe 1636 svchost.exe 5040 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3908 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1880 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3264 svchost.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 664 powershell.exe 664 powershell.exe 3332 powershell.exe 3332 powershell.exe 2284 powershell.exe 2284 powershell.exe 2680 powershell.exe 2680 powershell.exe 3264 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 340 XwormLoader.exe Token: SeDebugPrivilege 3264 svchost.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeDebugPrivilege 3332 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 1636 svchost.exe Token: SeDebugPrivilege 5040 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3264 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 340 wrote to memory of 3264 340 XwormLoader.exe 80 PID 340 wrote to memory of 3264 340 XwormLoader.exe 80 PID 340 wrote to memory of 2676 340 XwormLoader.exe 81 PID 340 wrote to memory of 2676 340 XwormLoader.exe 81 PID 340 wrote to memory of 248 340 XwormLoader.exe 82 PID 340 wrote to memory of 248 340 XwormLoader.exe 82 PID 248 wrote to memory of 3908 248 cmd.exe 84 PID 248 wrote to memory of 3908 248 cmd.exe 84 PID 3264 wrote to memory of 664 3264 svchost.exe 85 PID 3264 wrote to memory of 664 3264 svchost.exe 85 PID 3264 wrote to memory of 3332 3264 svchost.exe 87 PID 3264 wrote to memory of 3332 3264 svchost.exe 87 PID 3264 wrote to memory of 2284 3264 svchost.exe 89 PID 3264 wrote to memory of 2284 3264 svchost.exe 89 PID 3264 wrote to memory of 2680 3264 svchost.exe 91 PID 3264 wrote to memory of 2680 3264 svchost.exe 91 PID 3264 wrote to memory of 1880 3264 svchost.exe 93 PID 3264 wrote to memory of 1880 3264 svchost.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\XwormLoader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE0BB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3908
-
-
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD58d7b7dd345ec433b230173652499f84e
SHA131f29d8f896fd68744ca479d7f527e7673d36e5c
SHA2563e1ed03f539064ecae20aaf7e4ad09175ddb3d22873fc37534a567dacf059619
SHA5124b70c22b7e7eecb3e4061d9ff97192b7f626f0efda64838a14fc7545034f6ebafce180ed4a273b8f097a2c5a11f530e1f3b7921d4b19b2c183548fa8c0014326
-
Filesize
944B
MD5050567a067ffea4eb40fe2eefebdc1ee
SHA16e1fb2c7a7976e0724c532449e97722787a00fec
SHA2563952d5b543e5cb0cb84014f4ad9f5f1b7166f592d28640cbc3d914d0e6f41d2e
SHA512341ad71ef7e850b10e229666312e4bca87a0ed9fe25ba4b0ab65661d5a0efa855db0592153106da07134d8fc2c6c0e44709bf38183c9a574a1fa543189971259
-
Filesize
14.9MB
MD5db51a102eab752762748a2dec8f7f67a
SHA1194688ec1511b83063f7b0167ae250764b7591d1
SHA25693e5e7f018053c445c521b010caff89e61f61743635db3500aad32d6e495abb2
SHA512fb2fb6605a17fedb65e636cf3716568e85b8ea423c23e0513eb87f3a3441e2cabc4c3e6346225a9bf7b81e97470f3ab516feea649a7afb5cdf02faff8d7f09a5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
144KB
MD54b90399888a12fb85ccc3d0190d5a1d3
SHA13326c027bac28b9480b0c7f621481a6cc033db4e
SHA256cede03d0ef98d200bd5b68f6ca4e0d74e2a62fc430a38083663c3031dbb1c77f
SHA512899ec2df2f5d70716ad5d0686bfe0a6c66ccbcf7f0485efbdfc0615f90b3526cd3d31069fa66c7c6ae8bba6ce92200836c50da40a3731888b7326b970d93216a
-
Filesize
163B
MD55d7ec3346d9196ef031eacec5bc25eae
SHA1a00d8edd9e25cb7d09ef9e5265c611e70ed46e52
SHA2565a829e48bacc09bf023000e9e9dec739b7eb87c17c524fc970ee8f2741fbbfc8
SHA512f4ae9ba5b658cfae6a8c97c3178bddd50dcce7a66efff756beb9f85a94c081646dfa4d1bfc034a6937c22fbb68aeca6f84adff8c81012afc7a20ae80ce6d79b3