Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 22:00
Behavioral task
behavioral1
Sample
XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe
Resource
win10v2004-20241007-en
General
-
Target
XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe
-
Size
109KB
-
MD5
4bf2058e2fe4ee6490873acd8d00fc71
-
SHA1
099f6cd30e1db09c0c51fad208a2c2706c6bd437
-
SHA256
53d7f79b97f9bb3883a26b4cd84127e4c0c932ba82d9dd437b52373099049bea
-
SHA512
f4382641663486fadb345537b2d2fc8097e918ccc4697e79e5d1c219a6e66f301a2a4bc65f4a95f740fc92eccaef55ebd99ed49dafdbe2a28f906c15c549d4a5
-
SSDEEP
1536:xPsDAsCSuhbXNBcqhZ6tJaW9lSr89qmyVttdGFQeOPigx:1s5maVJaWPSI9qmyBeu
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3288 XWormLoader 5.1 x64.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3288-12-0x000001E5A2E40000-0x000001E5A3792000-memory.dmp agile_net -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.1 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.1 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.1 x64.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3288 XWormLoader 5.1 x64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3440 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3440 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3288 XWormLoader 5.1 x64.exe 3288 XWormLoader 5.1 x64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.1\XWormLoader 5.1 x64.exe"C:\Users\Admin\AppData\Local\Temp\XWorm\XWorm V5.1\XWormLoader 5.1 x64.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3288
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1864
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x3f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8