Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 04:35

General

  • Target

    a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe

  • Size

    6.4MB

  • MD5

    fd9e0297a3481184eadd1da037253980

  • SHA1

    23fc94ab1e1df30b6b9d988461f8a9d85e1ae4ca

  • SHA256

    a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff

  • SHA512

    e44545b127a0ddadec79fbcf9633fb56782dc80614b899d6db744852038dcb1aed1d47cb017c55d47ce62980e366f4e288d9bf7b52669fe08638f886f3da1904

  • SSDEEP

    196608:AB1D4Z5XqQSmFQB2QGYCa5ZOBhe2wuF0:aUXImFI4YCakB05r

Malware Config

Extracted

Family

xworm

Version

3.0

C2

147.185.221.25:6864

Mutex

aaF53Xl91CZagti1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe
    "C:\Users\Admin\AppData\Local\Temp\a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe
      "C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:2184
    • C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe
      "C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe

    Filesize

    34KB

    MD5

    1e628185b7962dae0db3031acaa8ca9a

    SHA1

    d50590ac9fd7876ba5b3a551a7c2ca931a30a008

    SHA256

    8a0e03bade1b0cd0fcf9771db9ec4e1af3be04a0516f8b59ef196c7ebdbbe3ee

    SHA512

    faa645f3ed6d6c0dbfd7b688007d289a58ae334e41cda9883cc64a2f682a2172c5da706d1ebb0c1f21ea642876c7fb2fd0dd7d07e673c93ede3e43c31c58181e

  • C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe

    Filesize

    7.1MB

    MD5

    71b0bb52ae4137c3e40dc802711e2acc

    SHA1

    e154869a5725806c2b12866479be8cf326d52116

    SHA256

    d1b0cb76d6ff1e54e5669cc3ba76ba6224be19e721cc61a9e223a596a9bb332f

    SHA512

    eea4513a347d9b2a5ee700388c34d9677869702384128b57e3299cff277b585fd713f4b44830c79da2b74ecc138d99c8aec9b4757d9dda6d3fa475a1dfdb6588

  • memory/1740-5-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-1-0x00000000002A0000-0x0000000000908000-memory.dmp

    Filesize

    6.4MB

  • memory/1740-0-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

    Filesize

    4KB

  • memory/1740-17-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2184-9-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2184-11-0x0000000000EA0000-0x0000000000EAE000-memory.dmp

    Filesize

    56KB

  • memory/2184-18-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2184-25-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2184-29-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-16-0x00000000010D0000-0x00000000017FA000-memory.dmp

    Filesize

    7.2MB

  • memory/2956-19-0x000000001EA00000-0x000000001F516000-memory.dmp

    Filesize

    11.1MB