Overview
overview
10Static
static
10XWorm v5.1-5.2.rar
windows11-21h2-x64
7XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...ks.dll
windows11-21h2-x64
1XWorm v5.1...il.dll
windows11-21h2-x64
1XWorm v5.1...ts.dll
windows11-21h2-x64
1XWorm v5.1...re.dll
windows11-21h2-x64
1XWorm v5.1...rs.dll
windows11-21h2-x64
1XWorm v5.1...ed.dll
windows11-21h2-x64
1XWorm v5.1...ls.dll
windows11-21h2-x64
1XWorm v5.1...io.dll
windows11-21h2-x64
1XWorm v5.1...on.dll
windows11-21h2-x64
1XWorm v5.1...ws.dll
windows11-21h2-x64
1XWorm v5.1...ne.dll
windows11-21h2-x64
1XWorm v5.1...at.dll
windows11-21h2-x64
1XWorm v5.1...rd.dll
windows11-21h2-x64
1XWorm v5.1...ss.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...DP.dll
windows11-21h2-x64
1XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3Analysis
-
max time kernel
896s -
max time network
438s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2024 10:10
Behavioral task
behavioral1
Sample
XWorm v5.1-5.2.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Mdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Pdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Rocks.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Backports.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.ILHelpers.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Iced.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Utils.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/NAudio.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/ActiveWindows.dll
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/All-In-One.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Chat.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Clipboard.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Cmstp-Bypass.dll
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileManager.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileSeacher.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/HRDP.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWorm V5.1.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWorm V5.2.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x64.exe.config
Resource
win11-20241023-en
General
-
Target
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Chat.wav
-
Size
45KB
-
MD5
832a3652fd780edcdb2439ec33532c0d
-
SHA1
f0754ee6519d77700f5ee5b744b8c99386d7b577
-
SHA256
45f4136e58a5f749d125d2ab54308f81954d2c5b364b66013660a6c358845d1e
-
SHA512
3b3b55afcdfa00d9b7085b20ed52a7b4d8b7d403f5d0d1c539781db1a20257efd8c856e19b8f32ea33766a580690b498ff063849519691a9a4cbbcd3e9447cd4
-
SSDEEP
768:QVPqefmaP5C3KduJn13jSHYHzIcr6DPW75Pvi3Fy5NQbIbhuJLA+LhDclY3Rp6:yP1mU5GlJnBS4TIQ6o163ofQ8b4Pfm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4249425805-3408538557-1766626484-1000\{4FDC5EED-665C-49DA-92E8-C6B734170C2D} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4324 wmplayer.exe Token: SeCreatePagefilePrivilege 4324 wmplayer.exe Token: SeShutdownPrivilege 4372 unregmp2.exe Token: SeCreatePagefilePrivilege 4372 unregmp2.exe Token: 33 1148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1148 AUDIODG.EXE Token: SeShutdownPrivilege 4324 wmplayer.exe Token: SeCreatePagefilePrivilege 4324 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4324 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4064 4324 wmplayer.exe 77 PID 4324 wrote to memory of 4064 4324 wmplayer.exe 77 PID 4324 wrote to memory of 4064 4324 wmplayer.exe 77 PID 4064 wrote to memory of 4372 4064 unregmp2.exe 78 PID 4064 wrote to memory of 4372 4064 unregmp2.exe 78
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2\XWorm\XWorm V5.2\Sounds\Chat.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1240
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004AC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5e60e7f0c46e10ab3797e81401556c1be
SHA155408f975ead4e6aa62a5cb02801aa610916a2a1
SHA25610fe03130d03db357a2c91f4f63d8b3a24bdc833e8d024b6c869cb5c7e59848b
SHA5125ef496a75027acd2f0449cf54066293a8285e8d8649ef3403457250811ad4c568be786eb7e538df304b8b211f04805292226c946dc3a481b6dfa84cb094ba94b
-
Filesize
1024KB
MD53648c7cca2fa2f33a5562aaf597c7d7b
SHA13372c73edcd9ddeb6d0734da8c53c52dc2905642
SHA256e27b9b0267db84eb24067d62cafd36dca18633a1594f8155d992d286d11ff677
SHA512229937a7c3262c11a164c60c5ad2847616c9be5c5d0f328272838a82b0b2526b33fd5e06d6e873722e43211a95a89cfe62c370006b5703955842c5738ad47987
-
Filesize
68KB
MD5f3559d9aadf23405a2bf6f7609b4c265
SHA1fb35770b7a03f812cadebe5f459f32a85d6dfdd9
SHA256bc7068c2da6bd22035b41832c170ef97e5d5bd5eb4ae7975de203c6f2d864526
SHA512db6eda72dc7ec33243c3cff5e3abe55c1bce1afb2744a3751c15123671feac32144e75492b542757a75f50c040463e3ef56889b609a0693122aee46b2b362fb4
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD548fa3411e09dc62311f7d9369d4b6daa
SHA14dc8b48afffdc954d69a2ef52cb86bac0f08d434
SHA256f16727d8735e8eed3ed0552e169ff2c24a99c2b5e468f04061773c4ca4f3d7cb
SHA512e559c04fb631a6a13e67648b7cbf183945f099e59de4c6dc5b7ec476707562f5bb882a4a2fe5d4e94ea501759dcc85e113185166d83e0319da90382ad618db45