Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 00:45

General

  • Target

    wub_64.exe

  • Size

    1.1MB

  • MD5

    3fb29133bba5f76baf2a75d7b177e33c

  • SHA1

    b5fce8752562db3bb24ca0c7f8c3c2da73098372

  • SHA256

    ed2412eaee0ed2a18411fda373dbf71a90296f5866aec5af55255a487b92af12

  • SHA512

    68170e31ba3ece0ee9294f0278bc2cf54be19cd73e80a9b78cc213f327464957f0fbee9aa16781791ed45e57cc107bd4825abc7661ab75df37546576c20cb243

  • SSDEEP

    24576:a0euAl7t8FI3YcD7ODKlLo0cKiAwWxd19LW7bXH6sv:tNAl7tN39Hns0cjWxNLW7b36

Malware Config

Extracted

Family

xworm

C2

vshostupdater.duckdns.org:34357

newport1179.duckdns.org:34357

windowsbre.duckdns.org:34357

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Updater.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\wub_64.exe
    "C:\Users\Admin\AppData\Local\Temp\wub_64.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Users\Admin\AppData\Roaming\Wub_x64.exe
      "C:\Users\Admin\AppData\Roaming\Wub_x64.exe"
      2⤵
      • Modifies security service
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4628
    • C:\Users\Admin\AppData\Roaming\Wub64x.exe
      "C:\Users\Admin\AppData\Roaming\Wub64x.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Updater" /tr "C:\Users\Admin\AppData\Roaming\Windows Updater.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4900
  • C:\Users\Admin\AppData\Roaming\Windows Updater.exe
    "C:\Users\Admin\AppData\Roaming\Windows Updater.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2348
  • C:\Users\Admin\AppData\Roaming\Windows Updater.exe
    "C:\Users\Admin\AppData\Roaming\Windows Updater.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Updater.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Temp\4o6h2p8y.tmp

    Filesize

    18KB

    MD5

    e271af82f26e2ea669c08049c4367de3

    SHA1

    bc27b67df570f92c72e96068ac60ae543220af0a

    SHA256

    7cda69a9623825130dc5a0f4b19c383197c55a93664ee4f68c2e1d201c9741f6

    SHA512

    b0ea7d0d35ad84634c71669d81957610fbe8a347024b3b37b5d6705792faf14c60e43b4be17a486cb0e4c24271470746c3693194cc2c7f83a8ac20d9cd69138c

  • C:\Users\Admin\AppData\Roaming\Wub.ini

    Filesize

    5KB

    MD5

    f99194a662e8064dd845796e34305c10

    SHA1

    484b8a18b6b5e82118fdc8632f3574387ff0f356

    SHA256

    03de37da85b0912959ad3f6145778fa98a36d055d212d2e84a4ae71a28de7619

    SHA512

    775bb94a438b0455d6936cad346be282a8e90701560627f33c0be5df366e04b9cccd1cc3051fbb56353701d432e21e1eaf9f2ef1c48237867fa94fbae6bdc386

  • C:\Users\Admin\AppData\Roaming\Wub64x.exe

    Filesize

    110KB

    MD5

    16730f8a80733a2681eeb86f0f108d98

    SHA1

    e562451160d20e8f398f3610ef3d1dd3307c59fd

    SHA256

    065e6ef1d6194ff38440c85ee9dd326c9487016a041643015b90f6226ef6a911

    SHA512

    94e9d478e750164e1682f17d82e7b93ff42a5b9d7e56020f13a7529aca774c74d77ce71f5f7d084bbe61cee1bc50b1589ef0cc402506098a93d3e7140680fd18

  • C:\Users\Admin\AppData\Roaming\Wub_x64.exe

    Filesize

    939KB

    MD5

    9d6778f7f274f7ecd4e7e875a7268b64

    SHA1

    452fa439f1cc0b9fcc37cf4b8cfff96e8cc348aa

    SHA256

    187eeee9e518011de1b87cfb0ed03e12ea551e9011f0c8defdd0e4535e672da2

    SHA512

    d51df55a5f903ec624550e847459bfa52fb19e892a58fe2de41251d9d98890b36f26a4950ad75f900de0311b5330066aaece11ec5e549d5b3867a61a344e0b87

  • memory/1604-0-0x00007FFCC2293000-0x00007FFCC2295000-memory.dmp

    Filesize

    8KB

  • memory/1604-1-0x0000000000A90000-0x0000000000BAA000-memory.dmp

    Filesize

    1.1MB

  • memory/4744-25-0x0000000000FE0000-0x0000000001000000-memory.dmp

    Filesize

    128KB

  • memory/4744-46-0x00007FFCC2290000-0x00007FFCC2D51000-memory.dmp

    Filesize

    10.8MB

  • memory/4744-89-0x00007FFCC2290000-0x00007FFCC2D51000-memory.dmp

    Filesize

    10.8MB