Analysis
-
max time kernel
35s -
max time network
30s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-01-2025 17:18
Behavioral task
behavioral1
Sample
XWorm V5.3 Optimized Bin/XWormLoader 5.2 x64.exe
Resource
win11-20241007-en
General
-
Target
XWorm V5.3 Optimized Bin/XWormLoader 5.2 x64.exe
-
Size
109KB
-
MD5
e6a20535b636d6402164a8e2d871ef6d
-
SHA1
981cb1fd9361ca58f8985104e00132d1836a8736
-
SHA256
b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2
-
SHA512
35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30
-
SSDEEP
1536:TYogSlNwXosKwOYtV1AS9m3xQyVGNNiLkWNF7XxFqmyVttdGFQeOPigx:TvgSlqGS9m3xQyKNbWNV3qmyBeu
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4068 XWormLoader 5.2 x64.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4068-12-0x000001C4B9C40000-0x000001C4BAA1E000-memory.dmp agile_net -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x64.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe 4068 XWormLoader 5.2 x64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4068 XWormLoader 5.2 x64.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4068 XWormLoader 5.2 x64.exe Token: 33 3180 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3180 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4068 XWormLoader 5.2 x64.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4068 XWormLoader 5.2 x64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.3 Optimized Bin\XWormLoader 5.2 x64.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.3 Optimized Bin\XWormLoader 5.2 x64.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4068
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4176
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004AC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8