General
-
Target
menu.exe
-
Size
309KB
-
Sample
241118-ck6scawdqn
-
MD5
b7a65ac9cc1f6ac490080b604dca0209
-
SHA1
40faa498a2e24a65b8ba74fd8123e63e2432f71f
-
SHA256
061282d0c5d8967e46c0b0739488fbefd996615a9059844274b1cb4df83b52bb
-
SHA512
fea5efae6766efd76d1b504ea516dd14eef955e84fec12a9035752366b7d36e078064b2088e04bee30ce267baa899a1b87f5a023316e59d4ecba7387a61943ed
-
SSDEEP
6144:QGXEB3uR4D7P05EkRTwEur5447h/PcHnUSFIT7JHoI0E7YPWs3kZy:QapW/PqbTw3FcHUSFU1v0E7v
Static task
static1
Behavioral task
behavioral1
Sample
menu.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
85.209.133.220:111
-
Install_directory
%Userprofile%
-
install_file
system.exe
Targets
-
-
Target
menu.exe
-
Size
309KB
-
MD5
b7a65ac9cc1f6ac490080b604dca0209
-
SHA1
40faa498a2e24a65b8ba74fd8123e63e2432f71f
-
SHA256
061282d0c5d8967e46c0b0739488fbefd996615a9059844274b1cb4df83b52bb
-
SHA512
fea5efae6766efd76d1b504ea516dd14eef955e84fec12a9035752366b7d36e078064b2088e04bee30ce267baa899a1b87f5a023316e59d4ecba7387a61943ed
-
SSDEEP
6144:QGXEB3uR4D7P05EkRTwEur5447h/PcHnUSFIT7JHoI0E7YPWs3kZy:QapW/PqbTw3FcHUSFU1v0E7v
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-