Overview
overview
10Static
static
10XWorm v5.1-5.2.rar
windows11-21h2-x64
7XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...ks.dll
windows11-21h2-x64
1XWorm v5.1...il.dll
windows11-21h2-x64
1XWorm v5.1...ts.dll
windows11-21h2-x64
1XWorm v5.1...re.dll
windows11-21h2-x64
1XWorm v5.1...rs.dll
windows11-21h2-x64
1XWorm v5.1...ed.dll
windows11-21h2-x64
1XWorm v5.1...ls.dll
windows11-21h2-x64
1XWorm v5.1...io.dll
windows11-21h2-x64
1XWorm v5.1...on.dll
windows11-21h2-x64
1XWorm v5.1...ws.dll
windows11-21h2-x64
1XWorm v5.1...ne.dll
windows11-21h2-x64
1XWorm v5.1...at.dll
windows11-21h2-x64
1XWorm v5.1...rd.dll
windows11-21h2-x64
1XWorm v5.1...ss.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...DP.dll
windows11-21h2-x64
1XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3Analysis
-
max time kernel
896s -
max time network
443s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2024 10:10
Behavioral task
behavioral1
Sample
XWorm v5.1-5.2.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Mdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Pdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Rocks.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Backports.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.ILHelpers.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Iced.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Utils.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/NAudio.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/ActiveWindows.dll
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/All-In-One.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Chat.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Clipboard.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Cmstp-Bypass.dll
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileManager.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileSeacher.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/HRDP.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWorm V5.1.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWorm V5.2.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x64.exe.config
Resource
win11-20241023-en
General
-
Target
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Chat.wav
-
Size
45KB
-
MD5
832a3652fd780edcdb2439ec33532c0d
-
SHA1
f0754ee6519d77700f5ee5b744b8c99386d7b577
-
SHA256
45f4136e58a5f749d125d2ab54308f81954d2c5b364b66013660a6c358845d1e
-
SHA512
3b3b55afcdfa00d9b7085b20ed52a7b4d8b7d403f5d0d1c539781db1a20257efd8c856e19b8f32ea33766a580690b498ff063849519691a9a4cbbcd3e9447cd4
-
SSDEEP
768:QVPqefmaP5C3KduJn13jSHYHzIcr6DPW75Pvi3Fy5NQbIbhuJLA+LhDclY3Rp6:yP1mU5GlJnBS4TIQ6o163ofQ8b4Pfm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-556537508-2730415644-482548075-1000\{0F016825-DEAE-4468-9BED-9B71F772D6A7} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3700 wmplayer.exe Token: SeCreatePagefilePrivilege 3700 wmplayer.exe Token: SeShutdownPrivilege 4244 unregmp2.exe Token: SeCreatePagefilePrivilege 4244 unregmp2.exe Token: 33 240 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 240 AUDIODG.EXE Token: SeShutdownPrivilege 3700 wmplayer.exe Token: SeCreatePagefilePrivilege 3700 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3700 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4848 3700 wmplayer.exe 77 PID 3700 wrote to memory of 4848 3700 wmplayer.exe 77 PID 3700 wrote to memory of 4848 3700 wmplayer.exe 77 PID 4848 wrote to memory of 4244 4848 unregmp2.exe 78 PID 4848 wrote to memory of 4244 4848 unregmp2.exe 78
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2\XWorm\XWorm V5.1\Sounds\Chat.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4664
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004F8 0x00000000000004F01⤵
- Suspicious use of AdjustPrivilegeToken
PID:240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD519d78b1eae63fd95e33c36ae0cad7aa8
SHA152bbbd1abf5e05fd11b19462a54685e7ccfc2d4b
SHA25650c2e86388d63a5a5a2052f9866083e8784c3eed266f9b947b4f5772e5fbcf80
SHA51234d6dd06fc41e2a3bf026cc58e461cf12064eab6969225d118b786aaacfabaac8bd7cbc6c26ad2c985faa04f0a07a4134119d4780c9189ded6db3d0fe9b59454
-
Filesize
1024KB
MD5fd776a0db9e538556fdc4b068c7310eb
SHA1ce5c2f0649a81c09086addd33e55a9e28bc6cd28
SHA2568ea158eb103218f384702ce9aed522ce740329670534572a92fd8c8719cafe01
SHA51256e37a94a303f12b8358344f7e109311d14bc5261518dcab730425a37b57a0dd591b3b0630f8bd61b1e14c308c72121658212cdedd10ebed8ca2cc489345f767
-
Filesize
68KB
MD5025951f5d0c20bb7d4febfc94e5a3c48
SHA17eea7c40a3c0cf03cef544c6884136f34ead9f59
SHA25685bb99c3233d85b4edc394b295ab06de1dda9439b5a0c853ed46ac3ec8d5c146
SHA5124b9bcf78d4101529308c5ec14804b0b27650767d2a505ce547ff6ff37b70ed492f74fbd3dc4598a55f0d1a7f94daeee5b7a317e62e8d4b74fe437a05ee5008d1
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD5fb8e5fe52ae4d42c82e0430731ac2cd3
SHA1e1fbaea93e7ef0714844c47df135e7393524fc8a
SHA256eec6c4b1ff11c1552a76989f5df0118070d86fbcde4336830f8c51c3a298b349
SHA512fd296aaf1e5191ae174afed1bdc46c64f4dda8c9921d48d9aa75b5b9b8da27ec0e474f8a312987e8dd6a6bfca38a12a43ccd58e6c071bc2d0cddfd8d60bc7a6d