Analysis
-
max time kernel
1049s -
max time network
1043s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 19:53
Behavioral task
behavioral1
Sample
Xworm 5.6.exe
Resource
win11-20241007-en
General
-
Target
Xworm 5.6.exe
-
Size
212KB
-
MD5
79a261a7ed31322af647ac3779479773
-
SHA1
e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5
-
SHA256
fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e
-
SHA512
137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179
-
SSDEEP
3072:mIl0bB95AOnVgk0A2ewhLapuvpAsZOyMqmyBeYVYA:/ubVhVnY/GWGwqqm1
Malware Config
Extracted
xworm
java-either.gl.at.ply.gg:50133
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2212-1-0x0000000000DE0000-0x0000000000E1C000-memory.dmp family_xworm behavioral1/files/0x002700000002ab1a-56.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3832 powershell.exe 4696 powershell.exe 4952 powershell.exe 888 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xworm.lnk Xworm 5.6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xworm.lnk Xworm 5.6.exe -
Executes dropped EXE 17 IoCs
pid Process 2916 Xworm 1212 Xworm 1276 Xworm 1220 Xworm 4712 Xworm 2720 Xworm 3172 Xworm 3372 Xworm 464 Xworm 4472 Xworm 2144 Xworm 2272 Xworm 876 Xworm 2472 Xworm 560 Xworm 4960 Xworm 3016 Xworm -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xworm = "C:\\Users\\Admin\\AppData\\Roaming\\Xworm" Xworm 5.6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4696 powershell.exe 4696 powershell.exe 4952 powershell.exe 4952 powershell.exe 888 powershell.exe 888 powershell.exe 3832 powershell.exe 3832 powershell.exe 2212 Xworm 5.6.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2212 Xworm 5.6.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 888 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeDebugPrivilege 2212 Xworm 5.6.exe Token: SeDebugPrivilege 2916 Xworm Token: SeDebugPrivilege 1212 Xworm Token: SeDebugPrivilege 1276 Xworm Token: SeDebugPrivilege 1220 Xworm Token: SeDebugPrivilege 4712 Xworm Token: SeDebugPrivilege 2720 Xworm Token: SeDebugPrivilege 3172 Xworm Token: SeDebugPrivilege 3372 Xworm Token: SeDebugPrivilege 464 Xworm Token: SeDebugPrivilege 4472 Xworm Token: SeDebugPrivilege 2144 Xworm Token: SeDebugPrivilege 2272 Xworm Token: SeDebugPrivilege 876 Xworm Token: SeDebugPrivilege 2472 Xworm Token: SeDebugPrivilege 560 Xworm Token: SeDebugPrivilege 4960 Xworm Token: SeDebugPrivilege 3016 Xworm -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2212 Xworm 5.6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2212 wrote to memory of 4696 2212 Xworm 5.6.exe 82 PID 2212 wrote to memory of 4696 2212 Xworm 5.6.exe 82 PID 2212 wrote to memory of 4952 2212 Xworm 5.6.exe 84 PID 2212 wrote to memory of 4952 2212 Xworm 5.6.exe 84 PID 2212 wrote to memory of 888 2212 Xworm 5.6.exe 86 PID 2212 wrote to memory of 888 2212 Xworm 5.6.exe 86 PID 2212 wrote to memory of 3832 2212 Xworm 5.6.exe 88 PID 2212 wrote to memory of 3832 2212 Xworm 5.6.exe 88 PID 2212 wrote to memory of 232 2212 Xworm 5.6.exe 90 PID 2212 wrote to memory of 232 2212 Xworm 5.6.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xworm 5.6.exe"C:\Users\Admin\AppData\Local\Temp\Xworm 5.6.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xworm 5.6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xworm 5.6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Xworm'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xworm'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Xworm" /tr "C:\Users\Admin\AppData\Roaming\Xworm"2⤵
- Scheduled Task/Job: Scheduled Task
PID:232
-
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:464
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:560
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
Filesize
944B
MD5cef328ddb1ee8916e7a658919323edd8
SHA1a676234d426917535e174f85eabe4ef8b88256a5
SHA256a1b5b7ada8ebc910f20f91ada3991d3321104e9da598c958b1edac9f9aca0e90
SHA512747400c20ca5b5fd1b54bc24e75e6a78f15af61df263be932d2ee7b2f34731c2de8ce03b2706954fb098c1ac36f0b761cf37e418738fa91f2a8ea78572f545cb
-
Filesize
944B
MD5051a74485331f9d9f5014e58ec71566c
SHA14ed0256a84f2e95609a0b4d5c249bca624db8fe4
SHA2563f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888
SHA5121f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
212KB
MD579a261a7ed31322af647ac3779479773
SHA1e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5
SHA256fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e
SHA512137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179