General
-
Target
New Text Document.txt
-
Size
48B
-
Sample
250104-wt9edasphr
-
MD5
534f5be9d239737fc0f7988c0d8f55ab
-
SHA1
7bd8add72810ae2c725bcbd4f001ee37e1aef16e
-
SHA256
bd9337e4327ce6c4b8cf3c2de54bc60605f93d59a87e4e6f1b9d90a4d73ec3bf
-
SHA512
e6447c19a57b17c252f9569c22b737ae9ca2afb7ef307bf3d7513af96c4b95e1f66280277ad22c9e8cff0db99f6aea02c12965a04568766d2c2e2101e6f2f93b
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.txt
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
xworm
5.0
AEfEUs08j7ZtP2B5
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/pv132qGS
Targets
-
-
Target
New Text Document.txt
-
Size
48B
-
MD5
534f5be9d239737fc0f7988c0d8f55ab
-
SHA1
7bd8add72810ae2c725bcbd4f001ee37e1aef16e
-
SHA256
bd9337e4327ce6c4b8cf3c2de54bc60605f93d59a87e4e6f1b9d90a4d73ec3bf
-
SHA512
e6447c19a57b17c252f9569c22b737ae9ca2afb7ef307bf3d7513af96c4b95e1f66280277ad22c9e8cff0db99f6aea02c12965a04568766d2c2e2101e6f2f93b
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2