Overview
overview
10Static
static
10XWorm v5.1-5.2.rar
windows11-21h2-x64
7XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...ks.dll
windows11-21h2-x64
1XWorm v5.1...il.dll
windows11-21h2-x64
1XWorm v5.1...ts.dll
windows11-21h2-x64
1XWorm v5.1...re.dll
windows11-21h2-x64
1XWorm v5.1...rs.dll
windows11-21h2-x64
1XWorm v5.1...ed.dll
windows11-21h2-x64
1XWorm v5.1...ls.dll
windows11-21h2-x64
1XWorm v5.1...io.dll
windows11-21h2-x64
1XWorm v5.1...on.dll
windows11-21h2-x64
1XWorm v5.1...ws.dll
windows11-21h2-x64
1XWorm v5.1...ne.dll
windows11-21h2-x64
1XWorm v5.1...at.dll
windows11-21h2-x64
1XWorm v5.1...rd.dll
windows11-21h2-x64
1XWorm v5.1...ss.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...DP.dll
windows11-21h2-x64
1XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3Analysis
-
max time kernel
897s -
max time network
445s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2024 10:10
Behavioral task
behavioral1
Sample
XWorm v5.1-5.2.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Mdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Pdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Rocks.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Backports.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.ILHelpers.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Iced.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Utils.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/NAudio.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/ActiveWindows.dll
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/All-In-One.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Chat.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Clipboard.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Cmstp-Bypass.dll
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileManager.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileSeacher.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/HRDP.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWorm V5.1.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWorm V5.2.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x64.exe.config
Resource
win11-20241023-en
General
-
Target
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Intro.wav
-
Size
238KB
-
MD5
ad3b4fae17bcabc254df49f5e76b87a6
-
SHA1
1683ff029eebaffdc7a4827827da7bb361c8747e
-
SHA256
e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
-
SHA512
3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
SSDEEP
3072:FU3hYG9X9JzhaLL5+QYKHZDa6D+4LT92KEpcP+b8FGUt0Ybs5e9jXjubLtNmBNs9:GjVsLL5lva6D+4P9llWvaGe9CHeBNm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3587106988-279496464-3440778474-1000\{2DE1D42D-754D-4272-9A6F-4E1A0E2E102C} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2844 wmplayer.exe Token: SeCreatePagefilePrivilege 2844 wmplayer.exe Token: SeShutdownPrivilege 5112 unregmp2.exe Token: SeCreatePagefilePrivilege 5112 unregmp2.exe Token: 33 1308 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1308 AUDIODG.EXE Token: SeShutdownPrivilege 2844 wmplayer.exe Token: SeCreatePagefilePrivilege 2844 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2844 wrote to memory of 876 2844 wmplayer.exe 79 PID 2844 wrote to memory of 876 2844 wmplayer.exe 79 PID 2844 wrote to memory of 876 2844 wmplayer.exe 79 PID 876 wrote to memory of 5112 876 unregmp2.exe 80 PID 876 wrote to memory of 5112 876 unregmp2.exe 80
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2\XWorm\XWorm V5.1\Sounds\Intro.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4948
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004BC 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5066f6e5acfff197d12b550ef7d452d41
SHA1aaa8cfa5a56519594490d069f31a42a15ca515a2
SHA256cac3a8354c7766b4ce0900bf4d8097bf372ec405a6af4bba63a6d92132932a30
SHA51221c3985bdc883b7c0fcdfb660a577eb03870943d9e812a24726158b6c06cc36b00425fdeafddcb099fddd1488173280563f7241c9589e69d04d1eb1b5daa786b
-
Filesize
1024KB
MD5a2efefeda7a36ac49ab9b88d97b464c9
SHA1ebcf99732c9e46ffce17663e9064a294a5c015eb
SHA25666452b1b63dbf62059b48873b56957453c008b0c93b48e6fd10f380ac1f5be7c
SHA51208f6d71affc8096b35d97fa33837a512d001c190ab38cdcd499284ef0d2f6bc477b2b4a9e8314887ee24e4596e1e1ae112c8cd1efff86a3a1297882e52517bed
-
Filesize
68KB
MD5e92c729d5f2f03ef45488454eeee17aa
SHA1f08aba78b03529e962314b0a12e946fd7466f3d5
SHA2563b589f24f277fd7b28fab6748776669775762f438a04b17e8eee4d6e89a7b993
SHA512ceafe7bd5a07d1e1d3205bf254de0f99f08a61010e52ce4b41e68bacec5fe4aaad7c34ab737997b34d0472672565e3b2af392220aefc06a03afa89d2b884b9c9
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5177a980f5f83466eb0b98b8d959877b9
SHA1af58f2980bbae28502bb5798c6d2b8c3803ec9a3
SHA256ff71b2270ab24d1cf58ad9b34121e096853838b0262b136950fcd3933105baab
SHA512d18b74505b71161797f772a6b97d7b0c673cbb68fe525a9fd91d3462f9545b879461adf2ebc870cdea23467132000b4bce5a7461abc877fde5c8a5508ee9b580