Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 18:01

General

  • Target

    XWorm V5.6/XwormLoader.exe

  • Size

    576KB

  • MD5

    f1a4c690564f491ad4f7fc8ce79e2fc3

  • SHA1

    cc16274baae2af0c614566d56b693774fe892168

  • SHA256

    0a3555b2ab1f76066c496eb43ebc520c82824a22cfcb714a75c5edc1ad99d88a

  • SHA512

    f7a1116b889493c079000847f5517e9149d5dce703b85b1520ad1d4810c575500aab47460a6e0d7e266fa5ef70ba10d4b625587725251734404913844897e180

  • SSDEEP

    12288:bwl4OwitTdBZpKfSTUNe/RhCEIX7RIiZmWJyGpfxd8KR0F7Br1dfPDWUw+b5/xgo:bwDdtTdBZISTACRhCE+Gi1yG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\XwormLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\XwormLoader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1400
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4440
    • C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\Xworm V5.6.exe
      "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\Xworm V5.6.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1248
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1196
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x3fc 0x408
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
      • C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\Xworm V5.6.exe
        "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6\Xworm V5.6.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3544
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:776

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xworm V5.6.exe.log

          Filesize

          1KB

          MD5

          2d2a235f1b0f4b608c5910673735494b

          SHA1

          23a63f6529bfdf917886ab8347092238db0423a0

          SHA256

          c897436c82fda9abf08b29fe05c42f4e59900116bbaf8bfd5b85ef3c97ab7884

          SHA512

          10684245497f1a115142d49b85000075eb36f360b59a0501e2f352c9f1d767c447c6c44c53a3fb3699402a15a8017bdbd2edd72d8599fdd4772e9e7cb67f3086

        • C:\Users\Admin\AppData\Roaming\d3d9.dll

          Filesize

          799KB

          MD5

          5c79d44ff8563412dce1bb36626781d6

          SHA1

          a13da89b3ec6becd64e1a5aa2780bde27b4bc467

          SHA256

          ecea21c9c2bd359747693dc3d34db8338547fdae7f06739336daa3d826a85135

          SHA512

          25e594e2526e76307f67ebec73bb3c8d96fc4a4b170d8fdffead41b798a00ede67e0fbe3e3d99b54ce424c356a10a262312149d84d76c8248464b135c7cd3d18

        • memory/1248-25-0x0000026EFC730000-0x0000026EFD618000-memory.dmp

          Filesize

          14.9MB

        • memory/1248-26-0x0000026F00200000-0x0000026F003F4000-memory.dmp

          Filesize

          2.0MB

        • memory/1400-21-0x0000000008270000-0x0000000008282000-memory.dmp

          Filesize

          72KB

        • memory/1400-19-0x00000000087E0000-0x0000000008DF8000-memory.dmp

          Filesize

          6.1MB

        • memory/1400-10-0x0000000000400000-0x00000000004AE000-memory.dmp

          Filesize

          696KB

        • memory/1400-13-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1400-24-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1400-15-0x00000000059B0000-0x0000000005F54000-memory.dmp

          Filesize

          5.6MB

        • memory/1400-16-0x00000000054A0000-0x0000000005532000-memory.dmp

          Filesize

          584KB

        • memory/1400-17-0x0000000005470000-0x000000000547A000-memory.dmp

          Filesize

          40KB

        • memory/1400-18-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1400-23-0x0000000008430000-0x000000000847C000-memory.dmp

          Filesize

          304KB

        • memory/1400-20-0x0000000008320000-0x000000000842A000-memory.dmp

          Filesize

          1.0MB

        • memory/1400-22-0x00000000082D0000-0x000000000830C000-memory.dmp

          Filesize

          240KB

        • memory/1924-0-0x000000007478E000-0x000000007478F000-memory.dmp

          Filesize

          4KB

        • memory/1924-12-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1924-9-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1924-14-0x0000000074780000-0x0000000074F30000-memory.dmp

          Filesize

          7.7MB

        • memory/1924-2-0x0000000005820000-0x0000000005826000-memory.dmp

          Filesize

          24KB

        • memory/1924-1-0x0000000000E60000-0x0000000000EFA000-memory.dmp

          Filesize

          616KB