Analysis

  • max time kernel
    93s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-11-2024 05:33

General

  • Target

    XWorm.rar

  • Size

    59.1MB

  • MD5

    6ec728dd292a8e1f39cd6baea415ff66

  • SHA1

    e1103f0af9d27f5c56667d98a36dd40ab5ec8392

  • SHA256

    c03c2ec5ef0958a61a913e2bfb80a420a030f579858cc203b3d2bc3b938400cd

  • SHA512

    ffc584bfb586e7c123f5e7c153fd9e9187e7010e7b4bce9ae590c05961bbbfa46b4c2f25ded830626e30aea919cec31f7026ccf699510f8cccb1921507829a40

  • SSDEEP

    1572864:c3UGEBh79oS6ea3nG8zWxYKClanZV79oS6eaqAHRvr:QEBhxb6eaxixDnZVxb6eaFJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5212
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5968
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:984
    • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe
      "C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:5924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      76fbe77cbc68f3bd5f0decad25775716

      SHA1

      2ebc2dea0b2224ea73fb5413d94ad38218122bf3

      SHA256

      8d59129db45c9f234318144380c9d167d89a9faa8e2a6aede9b5a3bcfdf650b6

      SHA512

      1a5d850914bd033defe42de3a333c2a7497927a07289258acd5ec08e973b4ed45030b0f299d6da5bac16ad607ed471b3db52a5c9676a532ecaa0836682618230

    • C:\Users\Admin\AppData\Local\Temp\7zEC5467DE7\XWorm\XWorm V5.1\Icons\icon (15).ico

      Filesize

      361KB

      MD5

      e3143e8c70427a56dac73a808cba0c79

      SHA1

      63556c7ad9e778d5bd9092f834b5cc751e419d16

      SHA256

      b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

      SHA512

      74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

    • C:\Users\Admin\AppData\Local\Temp\7zEC5467DE7\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe.config

      Filesize

      187B

      MD5

      15c8c4ba1aa574c0c00fd45bb9cce1ab

      SHA1

      0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

      SHA256

      f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

      SHA512

      52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

    • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

      Filesize

      112KB

      MD5

      2f1a50031dcf5c87d92e8b2491fdcea6

      SHA1

      71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

      SHA256

      47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

      SHA512

      1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

    • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\Guna.UI2.dll

      Filesize

      1.9MB

      MD5

      bcc0fe2b28edd2da651388f84599059b

      SHA1

      44d7756708aafa08730ca9dbdc01091790940a4f

      SHA256

      c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

      SHA512

      3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

    • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe

      Filesize

      12.2MB

      MD5

      8b7b015c1ea809f5c6ade7269bdc5610

      SHA1

      c67d5d83ca18731d17f79529cfdb3d3dcad36b96

      SHA256

      7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

      SHA512

      e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

    • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe.config

      Filesize

      183B

      MD5

      66f09a3993dcae94acfe39d45b553f58

      SHA1

      9d09f8e22d464f7021d7f713269b8169aed98682

      SHA256

      7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

      SHA512

      c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

    • memory/5924-346-0x000002A82A0D0000-0x000002A82AD08000-memory.dmp

      Filesize

      12.2MB

    • memory/5924-354-0x000002A846180000-0x000002A846D6C000-memory.dmp

      Filesize

      11.9MB

    • memory/5924-356-0x000002A847060000-0x000002A847254000-memory.dmp

      Filesize

      2.0MB