Analysis

  • max time kernel
    65s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 22:41

General

  • Target

    XWorm-5.6-main.zip

  • Size

    25.1MB

  • MD5

    95c1c4a3673071e05814af8b2a138be4

  • SHA1

    4c08b79195e0ff13b63cfb0e815a09dc426ac340

  • SHA256

    7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27

  • SHA512

    339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd

  • SSDEEP

    786432:Ty5jMDNnx2+4NYobtH8VVtKqi9+i514XZ/pjYlp0:MMDNnxV4iobxibiIi5MpjYv0

Malware Config

Extracted

Family

lumma

C2

https://pillowbrocccolipe.shop/api

https://communicationgenerwo.shop/api

https://diskretainvigorousiw.shop/api

https://affordcharmcropwo.shop/api

https://dismissalcylinderhostw.shop/api

https://enthusiasimtitleow.shop/api

https://worryfillvolcawoi.shop/api

https://cleartotalfisherwo.shop/api

Signatures

  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2752
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1012
    • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
      "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4896
    • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
      "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4504
    • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
      "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:880
    • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
      "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2064
    • C:\Users\Admin\Desktop\XWorm-5.6-main\Xworm V5.6.exe
      "C:\Users\Admin\Desktop\XWorm-5.6-main\Xworm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:32
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0vl3qq04\0vl3qq04.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:736
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8410.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc55133C2277514980B16AF33F58B85FF2.TMP"
          3⤵
            PID:1076
      • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
        "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2212
      • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
        "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1312
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:1168
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x2ec 0x4fc
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2452
        • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe
          "C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe"
          1⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2076

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0vl3qq04\0vl3qq04.0.vb

          Filesize

          78KB

          MD5

          3f1bb71f0386483a2ac30947cd0c15c6

          SHA1

          b1e0f4a2bececcb9f89ee85e66adcbcc97a1d7fc

          SHA256

          815088e36b8caaf0befdcdf0087ecbae666bcd17631895f7e8bad92ccb83165b

          SHA512

          b916b41c9b156a342ce2d9ba0f6aec91cfc681aefe8d712f34e59039c8bffbbb3b1a245e8be5a2159fd4c38dc0fadb2737cda2f4ed16335795ad6fc60c5cd10d

        • C:\Users\Admin\AppData\Local\Temp\0vl3qq04\0vl3qq04.cmdline

          Filesize

          305B

          MD5

          1196a873b2b59a396ab4c203b8df69c4

          SHA1

          3decd828d12549b8a54a4deb382a50f71793d634

          SHA256

          1f09618e48efdc1a8912edb128bbe89958946ec1ee7c1e449497453fb69e6dd3

          SHA512

          73839824cdd135db55195920bacb3ddeb5dca3e40727e6e8befe4a8526c8cd83009c7bc6cf4a2dc3f470d9426f68b6dc5998e5a4211140b7bf7a9d0885c079a8

        • C:\Users\Admin\AppData\Local\Temp\7zE0CA9B087\XWorm-5.6-main\Icons\icon (15).ico

          Filesize

          361KB

          MD5

          e3143e8c70427a56dac73a808cba0c79

          SHA1

          63556c7ad9e778d5bd9092f834b5cc751e419d16

          SHA256

          b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

          SHA512

          74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

        • C:\Users\Admin\AppData\Local\Temp\RES8410.tmp

          Filesize

          1KB

          MD5

          846d1173ddc5e7740544fa3f2a1059e3

          SHA1

          fbee03495d4cd2fe5e93786567c1cabc43eca6fc

          SHA256

          d7ef48594ce35575aba7178b3ddc0dad306f4ef4f1b4a1467282ce7ee0ef60d0

          SHA512

          f431fbad7bf9b479bd6dc6921b74a5768a523bd7aa90a0c0579282f1d3ab85d5681b6df6d92a84195a91062b87b62dffaadbac0ffbba6477dca224d9db950803

        • C:\Users\Admin\AppData\Local\Temp\vbc55133C2277514980B16AF33F58B85FF2.TMP

          Filesize

          1KB

          MD5

          d40c58bd46211e4ffcbfbdfac7c2bb69

          SHA1

          c5cf88224acc284a4e81bd612369f0e39f3ac604

          SHA256

          01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

          SHA512

          48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

        • C:\Users\Admin\Desktop\XWorm-5.6-main\GeoIP.dat

          Filesize

          1.2MB

          MD5

          8ef41798df108ce9bd41382c9721b1c9

          SHA1

          1e6227635a12039f4d380531b032bf773f0e6de0

          SHA256

          bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

          SHA512

          4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

        • C:\Users\Admin\Desktop\XWorm-5.6-main\Guna.UI2.dll

          Filesize

          1.9MB

          MD5

          bcc0fe2b28edd2da651388f84599059b

          SHA1

          44d7756708aafa08730ca9dbdc01091790940a4f

          SHA256

          c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

          SHA512

          3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

        • C:\Users\Admin\Desktop\XWorm-5.6-main\SimpleObfuscator.dll

          Filesize

          1.4MB

          MD5

          9043d712208178c33ba8e942834ce457

          SHA1

          e0fa5c730bf127a33348f5d2a5673260ae3719d1

          SHA256

          b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

          SHA512

          dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

        • C:\Users\Admin\Desktop\XWorm-5.6-main\Sounds\Intro.wav

          Filesize

          238KB

          MD5

          ad3b4fae17bcabc254df49f5e76b87a6

          SHA1

          1683ff029eebaffdc7a4827827da7bb361c8747e

          SHA256

          e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

          SHA512

          3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

        • C:\Users\Admin\Desktop\XWorm-5.6-main\Xworm V5.6.exe

          Filesize

          14.9MB

          MD5

          56ccb739926a725e78a7acf9af52c4bb

          SHA1

          5b01b90137871c3c8f0d04f510c4d56b23932cbc

          SHA256

          90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

          SHA512

          2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

        • C:\Users\Admin\Desktop\XWorm-5.6-main\Xworm V5.6.exe.config

          Filesize

          183B

          MD5

          66f09a3993dcae94acfe39d45b553f58

          SHA1

          9d09f8e22d464f7021d7f713269b8169aed98682

          SHA256

          7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

          SHA512

          c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

        • C:\Users\Admin\Desktop\XWorm-5.6-main\XwormLoader.exe

          Filesize

          490KB

          MD5

          9c9245810bad661af3d6efec543d34fd

          SHA1

          93e4f301156d120a87fe2c4be3aaa28b9dfd1a8d

          SHA256

          f5f14b9073f86da926a8ed319b3289b893442414d1511e45177f6915fb4e5478

          SHA512

          90d9593595511e722b733a13c53d2e69a1adc9c79b3349350deead2c1cdfed615921fb503597950070e9055f6df74bb64ccd94a60d7716822aa632699c70b767

        • memory/32-313-0x0000020BEF280000-0x0000020BEF2C2000-memory.dmp

          Filesize

          264KB

        • memory/32-290-0x0000020BEF280000-0x0000020BEF2C2000-memory.dmp

          Filesize

          264KB

        • memory/32-314-0x0000020BEF280000-0x0000020BEF2C2000-memory.dmp

          Filesize

          264KB

        • memory/32-288-0x0000020BEA2C0000-0x0000020BEA4B4000-memory.dmp

          Filesize

          2.0MB

        • memory/32-317-0x0000020BF11F0000-0x0000020BF1358000-memory.dmp

          Filesize

          1.4MB

        • memory/32-286-0x0000020BCCBC0000-0x0000020BCDAA8000-memory.dmp

          Filesize

          14.9MB

        • memory/32-332-0x0000020BEF280000-0x0000020BEF2C2000-memory.dmp

          Filesize

          264KB

        • memory/880-271-0x0000000000B00000-0x0000000000B4B000-memory.dmp

          Filesize

          300KB

        • memory/880-275-0x0000000000B00000-0x0000000000B4B000-memory.dmp

          Filesize

          300KB

        • memory/1312-304-0x0000000000FA0000-0x0000000000FEB000-memory.dmp

          Filesize

          300KB

        • memory/1312-299-0x0000000000FA0000-0x0000000000FEB000-memory.dmp

          Filesize

          300KB

        • memory/2064-282-0x0000000000E70000-0x0000000000EBB000-memory.dmp

          Filesize

          300KB

        • memory/2064-277-0x0000000000E70000-0x0000000000EBB000-memory.dmp

          Filesize

          300KB

        • memory/2076-312-0x0000000000BD0000-0x0000000000C1B000-memory.dmp

          Filesize

          300KB

        • memory/2076-307-0x0000000000BD0000-0x0000000000C1B000-memory.dmp

          Filesize

          300KB

        • memory/2212-292-0x0000000000980000-0x00000000009CB000-memory.dmp

          Filesize

          300KB

        • memory/2212-297-0x0000000000980000-0x00000000009CB000-memory.dmp

          Filesize

          300KB

        • memory/4504-267-0x0000000002FA0000-0x0000000002FD2000-memory.dmp

          Filesize

          200KB

        • memory/4504-257-0x00000000013E0000-0x000000000142B000-memory.dmp

          Filesize

          300KB

        • memory/4504-266-0x0000000002FA0000-0x0000000002FD2000-memory.dmp

          Filesize

          200KB

        • memory/4504-263-0x0000000002FA0000-0x0000000002FD2000-memory.dmp

          Filesize

          200KB

        • memory/4504-268-0x00000000013E0000-0x000000000142B000-memory.dmp

          Filesize

          300KB

        • memory/4504-264-0x0000000002FA0000-0x0000000002FD2000-memory.dmp

          Filesize

          200KB

        • memory/4504-262-0x0000000003150000-0x0000000003160000-memory.dmp

          Filesize

          64KB

        • memory/4504-265-0x0000000002FA0000-0x0000000002FD2000-memory.dmp

          Filesize

          200KB

        • memory/4896-255-0x0000000001370000-0x00000000013BB000-memory.dmp

          Filesize

          300KB

        • memory/4896-253-0x0000000003140000-0x0000000003141000-memory.dmp

          Filesize

          4KB

        • memory/4896-254-0x0000000003140000-0x0000000003141000-memory.dmp

          Filesize

          4KB

        • memory/4896-251-0x00000000032F0000-0x00000000032F1000-memory.dmp

          Filesize

          4KB

        • memory/4896-252-0x0000000003140000-0x0000000003141000-memory.dmp

          Filesize

          4KB

        • memory/4896-246-0x0000000001370000-0x00000000013BB000-memory.dmp

          Filesize

          300KB