General
-
Target
Sorry.exe
-
Size
481KB
-
Sample
250123-jkpmds1ldl
-
MD5
5c152e46af6e1de7f406cea257af9d1e
-
SHA1
d8b830c0c2e0aa7daeaab5759dc2e71351e98e3f
-
SHA256
f6262425730236425df601e87f0742166849b0737a1d918c5a8609553f75630f
-
SHA512
f52e406d166f61319ef2cc781a9c90abab2714746ae3203a8f7f412b02c45aeeb48d4f6966e6bd99279a8f348ac96ef379dc3f58259331c480dd70bf734abb01
-
SSDEEP
12288:CF2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9clJb8S:4HSZqoXuWPzloMaI9clD
Static task
static1
Behavioral task
behavioral1
Sample
Sorry.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا
-
Install_directory
%Port%
-
install_file
MicrosoftEdgeUpdateTaskMachineUAC.exe
Targets
-
-
Target
Sorry.exe
-
Size
481KB
-
MD5
5c152e46af6e1de7f406cea257af9d1e
-
SHA1
d8b830c0c2e0aa7daeaab5759dc2e71351e98e3f
-
SHA256
f6262425730236425df601e87f0742166849b0737a1d918c5a8609553f75630f
-
SHA512
f52e406d166f61319ef2cc781a9c90abab2714746ae3203a8f7f412b02c45aeeb48d4f6966e6bd99279a8f348ac96ef379dc3f58259331c480dd70bf734abb01
-
SSDEEP
12288:CF2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9clJb8S:4HSZqoXuWPzloMaI9clD
-
Detect Xworm Payload
-
UAC bypass
-
Windows security bypass
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
4Modify Registry
6