Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/01/2025, 04:35 UTC

General

  • Target

    a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe

  • Size

    6.4MB

  • MD5

    fd9e0297a3481184eadd1da037253980

  • SHA1

    23fc94ab1e1df30b6b9d988461f8a9d85e1ae4ca

  • SHA256

    a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff

  • SHA512

    e44545b127a0ddadec79fbcf9633fb56782dc80614b899d6db744852038dcb1aed1d47cb017c55d47ce62980e366f4e288d9bf7b52669fe08638f886f3da1904

  • SSDEEP

    196608:AB1D4Z5XqQSmFQB2QGYCa5ZOBhe2wuF0:aUXImFI4YCakB05r

Malware Config

Extracted

Family

xworm

Version

3.0

C2

147.185.221.25:6864

Mutex

aaF53Xl91CZagti1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
1
CijgcdCiENxNSudZm6PODQ==

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe
    "C:\Users\Admin\AppData\Local\Temp\a36885c797f9c9c2970c185c103953c6c1f86a5d49606bf675fdf01c2d32d9ff.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:68
    • C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe
      "C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:4372
    • C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe
      "C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe"
      2⤵
      • Executes dropped EXE
      PID:4236

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    167.173.78.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.173.78.104.in-addr.arpa
    IN PTR
    Response
    167.173.78.104.in-addr.arpa
    IN PTR
    a104-78-173-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    ip-api.com
    XWorm Info.exe
    Remote address:
    8.8.8.8:53
    Request
    ip-api.com
    IN A
    Response
    ip-api.com
    IN A
    208.95.112.1
  • flag-us
    GET
    http://ip-api.com/line/?fields=hosting
    XWorm Info.exe
    Remote address:
    208.95.112.1:80
    Request
    GET /line/?fields=hosting HTTP/1.1
    Host: ip-api.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Mon, 20 Jan 2025 04:36:35 GMT
    Content-Type: text/plain; charset=utf-8
    Content-Length: 6
    Access-Control-Allow-Origin: *
    X-Ttl: 37
    X-Rl: 43
  • flag-us
    DNS
    1.112.95.208.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.112.95.208.in-addr.arpa
    IN PTR
    Response
    1.112.95.208.in-addr.arpa
    IN PTR
    ip-apicom
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    212.20.149.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    212.20.149.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    134.130.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.130.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 208.95.112.1:80
    http://ip-api.com/line/?fields=hosting
    http
    XWorm Info.exe
    310 B
    347 B
    5
    4

    HTTP Request

    GET http://ip-api.com/line/?fields=hosting

    HTTP Response

    200
  • 147.185.221.25:6864
    XWorm Info.exe
    260 B
    5
  • 147.185.221.25:6864
    XWorm Info.exe
    260 B
    5
  • 147.185.221.25:6864
    XWorm Info.exe
    260 B
    5
  • 147.185.221.25:6864
    XWorm Info.exe
    260 B
    5
  • 147.185.221.25:6864
    XWorm Info.exe
    260 B
    5
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    167.173.78.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    167.173.78.104.in-addr.arpa

  • 8.8.8.8:53
    ip-api.com
    dns
    XWorm Info.exe
    56 B
    72 B
    1
    1

    DNS Request

    ip-api.com

    DNS Response

    208.95.112.1

  • 8.8.8.8:53
    1.112.95.208.in-addr.arpa
    dns
    71 B
    95 B
    1
    1

    DNS Request

    1.112.95.208.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    212.20.149.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    212.20.149.52.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    134.130.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    134.130.81.91.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XWorm Info.exe

    Filesize

    34KB

    MD5

    1e628185b7962dae0db3031acaa8ca9a

    SHA1

    d50590ac9fd7876ba5b3a551a7c2ca931a30a008

    SHA256

    8a0e03bade1b0cd0fcf9771db9ec4e1af3be04a0516f8b59ef196c7ebdbbe3ee

    SHA512

    faa645f3ed6d6c0dbfd7b688007d289a58ae334e41cda9883cc64a2f682a2172c5da706d1ebb0c1f21ea642876c7fb2fd0dd7d07e673c93ede3e43c31c58181e

  • C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe

    Filesize

    7.1MB

    MD5

    71b0bb52ae4137c3e40dc802711e2acc

    SHA1

    e154869a5725806c2b12866479be8cf326d52116

    SHA256

    d1b0cb76d6ff1e54e5669cc3ba76ba6224be19e721cc61a9e223a596a9bb332f

    SHA512

    eea4513a347d9b2a5ee700388c34d9677869702384128b57e3299cff277b585fd713f4b44830c79da2b74ecc138d99c8aec9b4757d9dda6d3fa475a1dfdb6588

  • memory/68-30-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/68-1-0x0000000000A10000-0x0000000001078000-memory.dmp

    Filesize

    6.4MB

  • memory/68-4-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/68-0-0x00007FFF45A13000-0x00007FFF45A15000-memory.dmp

    Filesize

    8KB

  • memory/4236-31-0x000002304C590000-0x000002304CCBA000-memory.dmp

    Filesize

    7.2MB

  • memory/4236-29-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4236-32-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4236-33-0x0000023068770000-0x0000023069286000-memory.dmp

    Filesize

    11.1MB

  • memory/4236-44-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4372-19-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4372-18-0x0000000000450000-0x000000000045E000-memory.dmp

    Filesize

    56KB

  • memory/4372-36-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4372-43-0x00007FFF45A10000-0x00007FFF464D1000-memory.dmp

    Filesize

    10.8MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.