Analysis
-
max time kernel
744s -
max time network
433s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 17:55
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win7-20240903-en
General
-
Target
XWorm-5.6-main.zip
-
Size
25.1MB
-
MD5
95c1c4a3673071e05814af8b2a138be4
-
SHA1
4c08b79195e0ff13b63cfb0e815a09dc426ac340
-
SHA256
7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
-
SHA512
339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd
-
SSDEEP
786432:Ty5jMDNnx2+4NYobtH8VVtKqi9+i514XZ/pjYlp0:MMDNnxV4iobxibiIi5MpjYv0
Malware Config
Extracted
lumma
https://pillowbrocccolipe.shop/api
https://communicationgenerwo.shop/api
https://diskretainvigorousiw.shop/api
https://affordcharmcropwo.shop/api
https://dismissalcylinderhostw.shop/api
https://enthusiasimtitleow.shop/api
https://worryfillvolcawoi.shop/api
https://cleartotalfisherwo.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 6 IoCs
Processes:
XwormLoader.exeXwormLoader.exeXworm V5.6.exeXwormLoader.exeXworm V5.6.exeXwormLoader.exepid process 4408 XwormLoader.exe 2600 XwormLoader.exe 3548 Xworm V5.6.exe 3048 XwormLoader.exe 4920 Xworm V5.6.exe 2464 XwormLoader.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
XwormLoader.exeXwormLoader.exeXwormLoader.exeXwormLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XwormLoader.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
7zFM.exepid process 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2208 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2208 7zFM.exe Token: 35 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
7zFM.exepid process 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
7zFM.exedescription pid process target process PID 2208 wrote to memory of 4408 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 4408 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 4408 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 2600 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 2600 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 2600 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 3548 2208 7zFM.exe Xworm V5.6.exe PID 2208 wrote to memory of 3548 2208 7zFM.exe Xworm V5.6.exe PID 2208 wrote to memory of 3048 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 3048 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 3048 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 4920 2208 7zFM.exe Xworm V5.6.exe PID 2208 wrote to memory of 4920 2208 7zFM.exe Xworm V5.6.exe PID 2208 wrote to memory of 2464 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 2464 2208 7zFM.exe XwormLoader.exe PID 2208 wrote to memory of 2464 2208 7zFM.exe XwormLoader.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7zO0A8AD568\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A8AD568\XwormLoader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0A83E4D8\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A83E4D8\XwormLoader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0A848AD8\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A848AD8\Xworm V5.6.exe"2⤵
- Executes dropped EXE
PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0A861188\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A861188\XwormLoader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0A8274B8\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A8274B8\Xworm V5.6.exe"2⤵
- Executes dropped EXE
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0A848069\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0A848069\XwormLoader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
Filesize
490KB
MD59c9245810bad661af3d6efec543d34fd
SHA193e4f301156d120a87fe2c4be3aaa28b9dfd1a8d
SHA256f5f14b9073f86da926a8ed319b3289b893442414d1511e45177f6915fb4e5478
SHA51290d9593595511e722b733a13c53d2e69a1adc9c79b3349350deead2c1cdfed615921fb503597950070e9055f6df74bb64ccd94a60d7716822aa632699c70b767
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc