Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 14:34
Behavioral task
behavioral1
Sample
XWorm_V5.6.rar
Resource
win7-20240708-en
General
-
Target
XWorm_V5.6.rar
-
Size
22.7MB
-
MD5
bf2914828889b9f53f5dca3d9bda6f17
-
SHA1
7155e7938a6474d637a83c692eb60d34a8c6e94b
-
SHA256
0a10a2d40d0d1af7fe2d6c90e6ec033bebac388c247845459c59a6cb3e1f1350
-
SHA512
304b612339c0698c4ced92672eb559be4bcdfcdf94c16621430d8822939b970ee9491a7686aa36c3e14527bf0137728c57462e5bbc2107aab32bdce2f929727f
-
SSDEEP
393216:ygLv40tO3Q7adTFRWjVzPZQOo4IdenR/XdGmq+j0f2NXPM3Py/ZmZUeoatgiZMdC:yuw0tO3d9zWjVTZQOoSnR/sygONXPaPd
Malware Config
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d05-250.dat family_xworm behavioral2/memory/4556-259-0x0000000000EA0000-0x0000000000ECA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2912 powershell.exe 2852 powershell.exe 400 powershell.exe 2420 powershell.exe -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0007000000023d01-237.dat net_reactor behavioral2/files/0x0007000000023d05-250.dat net_reactor behavioral2/memory/4556-259-0x0000000000EA0000-0x0000000000ECA000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation XwormLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1032 XwormLoader.exe 4556 svchost.exe 3524 Xworm V5.6.exe 920 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3788 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4016 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4556 svchost.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2420 powershell.exe 2420 powershell.exe 2420 powershell.exe 2912 powershell.exe 2912 powershell.exe 2912 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 400 powershell.exe 400 powershell.exe 400 powershell.exe 4556 svchost.exe 4556 svchost.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3632 7zFM.exe 3524 Xworm V5.6.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 3632 7zFM.exe Token: 35 3632 7zFM.exe Token: SeSecurityPrivilege 3632 7zFM.exe Token: SeDebugPrivilege 1032 XwormLoader.exe Token: SeDebugPrivilege 4556 svchost.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: 33 532 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 532 AUDIODG.EXE Token: SeDebugPrivilege 920 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3632 7zFM.exe 3632 7zFM.exe 3524 Xworm V5.6.exe 3524 Xworm V5.6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3524 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4556 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1032 wrote to memory of 4556 1032 XwormLoader.exe 92 PID 1032 wrote to memory of 4556 1032 XwormLoader.exe 92 PID 1032 wrote to memory of 3524 1032 XwormLoader.exe 96 PID 1032 wrote to memory of 3524 1032 XwormLoader.exe 96 PID 1032 wrote to memory of 1016 1032 XwormLoader.exe 98 PID 1032 wrote to memory of 1016 1032 XwormLoader.exe 98 PID 4556 wrote to memory of 2420 4556 svchost.exe 101 PID 4556 wrote to memory of 2420 4556 svchost.exe 101 PID 1016 wrote to memory of 3788 1016 cmd.exe 102 PID 1016 wrote to memory of 3788 1016 cmd.exe 102 PID 4556 wrote to memory of 2912 4556 svchost.exe 105 PID 4556 wrote to memory of 2912 4556 svchost.exe 105 PID 4556 wrote to memory of 2852 4556 svchost.exe 107 PID 4556 wrote to memory of 2852 4556 svchost.exe 107 PID 4556 wrote to memory of 400 4556 svchost.exe 109 PID 4556 wrote to memory of 400 4556 svchost.exe 109 PID 4556 wrote to memory of 4016 4556 svchost.exe 114 PID 4556 wrote to memory of 4016 4556 svchost.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm_V5.6.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3632
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:940
-
C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"C:\Users\Admin\Desktop\XWorm V5.6\XwormLoader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4016
-
-
-
C:\Users\Admin\Desktop\XWorm V5.6\Xworm V5.6.exe"C:\Users\Admin\Desktop\XWorm V5.6\Xworm V5.6.exe"2⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBB3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3788
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2464
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3241⤵
- Suspicious use of AdjustPrivilegeToken
PID:532
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5b22e474ed28d9d677884475bd14a9a27
SHA197486a5bfd07deb4a1f1520e2768ac87b2f522a7
SHA256fcd40c14af08e3f03c3def5e9ef278d7da0b7d9e12bde4bddd3aa25974104296
SHA512b40bce14e2631363a96845d92288aaebe5e52120bbdcba6d2fc04f2d58c44a50c139b5f039d85af0c091299ce25dde261fafc9c4c60452fe82b31b02bf897f7c
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
144KB
MD54b90399888a12fb85ccc3d0190d5a1d3
SHA13326c027bac28b9480b0c7f621481a6cc033db4e
SHA256cede03d0ef98d200bd5b68f6ca4e0d74e2a62fc430a38083663c3031dbb1c77f
SHA512899ec2df2f5d70716ad5d0686bfe0a6c66ccbcf7f0485efbdfc0615f90b3526cd3d31069fa66c7c6ae8bba6ce92200836c50da40a3731888b7326b970d93216a
-
Filesize
162B
MD597a3b7f10e61113c782378b757d0aa0d
SHA15f2f071bdbf468d5aedbf8912982db94444d5291
SHA2562246a8dcf060ad7e615efb73f72a81d8cf307bf0684b0069b239077483a91ff8
SHA512453f2f8c4cea05703902e567efc22d9eb633ab51294bb12c040847ae6dc2f54dbfbb0db250d301c62e4bc8b7535cd0acceb3c3b3fb9938a5dcbeaf076fa6c15c
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
14.9MB
MD5db51a102eab752762748a2dec8f7f67a
SHA1194688ec1511b83063f7b0167ae250764b7591d1
SHA25693e5e7f018053c445c521b010caff89e61f61743635db3500aad32d6e495abb2
SHA512fb2fb6605a17fedb65e636cf3716568e85b8ea423c23e0513eb87f3a3441e2cabc4c3e6346225a9bf7b81e97470f3ab516feea649a7afb5cdf02faff8d7f09a5
-
Filesize
7.9MB
MD55b757c6d0af650a77ba1bf7edea18b36
SHA1c2ee4e12ff4b70511dbcab25dbf8b0d45f2d52b3
SHA256c2a9fefda9159dd2712510c1c9077a1885d0ebc45251285dad95ba7184b98856
SHA51293ca04887c63c3a0a4a5d42c48d0f4f7cc7fe7f6dad4dd45136ac048639d2edab66a2d2459779b9a2a075fa8981ea40567b34e5ed0535c1deecfe5e838385960