Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 20:12
Behavioral task
behavioral1
Sample
Xworm5.6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xworm5.6.exe
Resource
win10v2004-20241007-en
General
-
Target
Xworm5.6.exe
-
Size
212KB
-
MD5
79a261a7ed31322af647ac3779479773
-
SHA1
e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5
-
SHA256
fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e
-
SHA512
137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179
-
SSDEEP
3072:mIl0bB95AOnVgk0A2ewhLapuvpAsZOyMqmyBeYVYA:/ubVhVnY/GWGwqqm1
Malware Config
Extracted
xworm
java-either.gl.at.ply.gg:50133
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2164-1-0x0000000000F50000-0x0000000000F8C000-memory.dmp family_xworm behavioral1/files/0x000c000000012254-34.dat family_xworm behavioral1/memory/2928-36-0x00000000010F0000-0x000000000112C000-memory.dmp family_xworm behavioral1/memory/2300-39-0x0000000001340000-0x000000000137C000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2092 powershell.exe 2900 powershell.exe 1488 powershell.exe 1036 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xworm.lnk Xworm5.6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xworm.lnk Xworm5.6.exe -
Executes dropped EXE 2 IoCs
pid Process 2928 Xworm 2300 Xworm -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xworm = "C:\\Users\\Admin\\AppData\\Roaming\\Xworm" Xworm5.6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2900 powershell.exe 1488 powershell.exe 1036 powershell.exe 2092 powershell.exe 2164 Xworm5.6.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2164 Xworm5.6.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2164 Xworm5.6.exe Token: SeDebugPrivilege 2928 Xworm Token: SeDebugPrivilege 2300 Xworm -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 Xworm5.6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2900 2164 Xworm5.6.exe 30 PID 2164 wrote to memory of 2900 2164 Xworm5.6.exe 30 PID 2164 wrote to memory of 2900 2164 Xworm5.6.exe 30 PID 2164 wrote to memory of 1488 2164 Xworm5.6.exe 32 PID 2164 wrote to memory of 1488 2164 Xworm5.6.exe 32 PID 2164 wrote to memory of 1488 2164 Xworm5.6.exe 32 PID 2164 wrote to memory of 1036 2164 Xworm5.6.exe 34 PID 2164 wrote to memory of 1036 2164 Xworm5.6.exe 34 PID 2164 wrote to memory of 1036 2164 Xworm5.6.exe 34 PID 2164 wrote to memory of 2092 2164 Xworm5.6.exe 36 PID 2164 wrote to memory of 2092 2164 Xworm5.6.exe 36 PID 2164 wrote to memory of 2092 2164 Xworm5.6.exe 36 PID 2164 wrote to memory of 2556 2164 Xworm5.6.exe 38 PID 2164 wrote to memory of 2556 2164 Xworm5.6.exe 38 PID 2164 wrote to memory of 2556 2164 Xworm5.6.exe 38 PID 2820 wrote to memory of 2928 2820 taskeng.exe 41 PID 2820 wrote to memory of 2928 2820 taskeng.exe 41 PID 2820 wrote to memory of 2928 2820 taskeng.exe 41 PID 2820 wrote to memory of 2300 2820 taskeng.exe 42 PID 2820 wrote to memory of 2300 2820 taskeng.exe 42 PID 2820 wrote to memory of 2300 2820 taskeng.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xworm5.6.exe"C:\Users\Admin\AppData\Local\Temp\Xworm5.6.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xworm5.6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xworm5.6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Xworm'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xworm'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Xworm" /tr "C:\Users\Admin\AppData\Roaming\Xworm"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8880BDBE-A355-4035-8594-6784615F281D} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Users\Admin\AppData\Roaming\XwormC:\Users\Admin\AppData\Roaming\Xworm2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59faf40cc7b9995b5c9957635e03e938f
SHA12ae1de519ef20ad44dc97ac2befbaf0078fcb9c5
SHA2564503ca98e53d2c13a38daa4891f20e3653f4758db363bbea9d7b9d5087dab8e9
SHA512dd9369ce1b62f87d112a16c575549134cd72b2f54b8165611e3cfc5bea53c27f166d068c61b86e8d25969891046106ca3fd61380d6edfe98c45f9aeda4d1ee6c
-
Filesize
212KB
MD579a261a7ed31322af647ac3779479773
SHA1e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5
SHA256fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e
SHA512137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179