Overview
overview
10Static
static
10XWorm v5.1-5.2.rar
windows11-21h2-x64
7XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...db.dll
windows11-21h2-x64
1XWorm v5.1...ks.dll
windows11-21h2-x64
1XWorm v5.1...il.dll
windows11-21h2-x64
1XWorm v5.1...ts.dll
windows11-21h2-x64
1XWorm v5.1...re.dll
windows11-21h2-x64
1XWorm v5.1...rs.dll
windows11-21h2-x64
1XWorm v5.1...ed.dll
windows11-21h2-x64
1XWorm v5.1...ls.dll
windows11-21h2-x64
1XWorm v5.1...io.dll
windows11-21h2-x64
1XWorm v5.1...on.dll
windows11-21h2-x64
1XWorm v5.1...ws.dll
windows11-21h2-x64
1XWorm v5.1...ne.dll
windows11-21h2-x64
1XWorm v5.1...at.dll
windows11-21h2-x64
1XWorm v5.1...rd.dll
windows11-21h2-x64
1XWorm v5.1...ss.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...er.dll
windows11-21h2-x64
1XWorm v5.1...DP.dll
windows11-21h2-x64
1XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...me.txt
windows11-21h2-x64
3XWorm v5.1...at.wav
windows11-21h2-x64
6XWorm v5.1...ro.wav
windows11-21h2-x64
6XWorm v5.1...xe.xml
windows11-21h2-x64
1XWorm v5.1...config
windows11-21h2-x64
3XWorm v5.1...config
windows11-21h2-x64
3Analysis
-
max time kernel
896s -
max time network
448s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2024 10:10
Behavioral task
behavioral1
Sample
XWorm v5.1-5.2.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Mdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Pdb.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.Rocks.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Mono.Cecil.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Backports.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.ILHelpers.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Iced.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/MonoMod.Utils.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/NAudio.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/ActiveWindows.dll
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/All-In-One.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Chat.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Clipboard.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/Cmstp-Bypass.dll
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileManager.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/FileSeacher.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Plugins/HRDP.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWorm V5.1.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.1/XWormLoader 5.1 x64.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Readme.txt
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Chat.wav
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Intro.wav
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWorm V5.2.exe.xml
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x32.exe.config
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
XWorm v5.1-5.2/XWorm/XWorm V5.2/XWormLoader 5.2 x64.exe.config
Resource
win11-20241023-en
General
-
Target
XWorm v5.1-5.2/XWorm/XWorm V5.2/Sounds/Intro.wav
-
Size
238KB
-
MD5
ad3b4fae17bcabc254df49f5e76b87a6
-
SHA1
1683ff029eebaffdc7a4827827da7bb361c8747e
-
SHA256
e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
-
SHA512
3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
SSDEEP
3072:FU3hYG9X9JzhaLL5+QYKHZDa6D+4LT92KEpcP+b8FGUt0Ybs5e9jXjubLtNmBNs9:GjVsLL5lva6D+4P9llWvaGe9CHeBNm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2410826464-2353372766-2364966905-1000\{B4D2FFA8-55CF-4B24-8961-C889A02A359D} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4892 wmplayer.exe Token: SeCreatePagefilePrivilege 4892 wmplayer.exe Token: SeShutdownPrivilege 4276 unregmp2.exe Token: SeCreatePagefilePrivilege 4276 unregmp2.exe Token: 33 400 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 400 AUDIODG.EXE Token: SeShutdownPrivilege 4892 wmplayer.exe Token: SeCreatePagefilePrivilege 4892 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4892 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2116 4892 wmplayer.exe 78 PID 4892 wrote to memory of 2116 4892 wmplayer.exe 78 PID 4892 wrote to memory of 2116 4892 wmplayer.exe 78 PID 2116 wrote to memory of 4276 2116 unregmp2.exe 79 PID 2116 wrote to memory of 4276 2116 unregmp2.exe 79
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2\XWorm\XWorm V5.2\Sounds\Intro.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1500
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5066f6e5acfff197d12b550ef7d452d41
SHA1aaa8cfa5a56519594490d069f31a42a15ca515a2
SHA256cac3a8354c7766b4ce0900bf4d8097bf372ec405a6af4bba63a6d92132932a30
SHA51221c3985bdc883b7c0fcdfb660a577eb03870943d9e812a24726158b6c06cc36b00425fdeafddcb099fddd1488173280563f7241c9589e69d04d1eb1b5daa786b
-
Filesize
1024KB
MD5c7b77c4c0e467ddefb387f98028eb5c6
SHA192efdc5cc691b837a836e8b49c599848cf2fa8cd
SHA2561a6a4fc9a66916dd0392395478a2fb94e34fad2ddfd5c63ab90012a1d1ec3022
SHA512d85be3690768f2fca681cf30869c0544358f2a763bcd252fa43fe6f6dab13915fc1c81661f4a800484cd37d8eff148544dad5172d3202dd15790ead2ff9d4c8d
-
Filesize
68KB
MD5959020a2b7613073e17ba49030f56ca6
SHA18b226d1f8a6501356034a711ad51b9c7741930ff
SHA256cc982aa09e1a3401fa6a9874b1c8b370b31ec551935027c6087230e24c001dd3
SHA51295f4c00914909984c4eb1c97d38c4454e4feb72006ab43af6d568d4d5cf95956ec3b84a72697b243c04504c8660b1a9a6d07444e188a53c445b3e81d117c9c76
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5ef8bf10b43e407fe2a8db77909b768fc
SHA1112e9da8593f1fccf9dab92ab0a04a89350b4fe8
SHA25600031d24501cf3b39b4b0a6e8109c1347dbc1e9ca8d98645dd0e4d19a9f022c4
SHA512a3ce516f8388e3d0eae451ffc6f855ea6915300a0b451ce751b2befceb777ce1ad36e13d24cf2c5e1d822890ddcb4574d934f4a1eb9c7871f21421e8650bc289