General
-
Target
c7xdsg43_1.exe._2.exe
-
Size
3.9MB
-
Sample
250124-esd4eaypbw
-
MD5
2e975b87f63c8dd384c803765d5d1c0b
-
SHA1
fdf785a15472093c6ff6228a4912076029eef54e
-
SHA256
08e348287c5287415442ccf3ce4ffef96d4a5d71f4d2de045e99f115db6c12b7
-
SHA512
dfdd0e57c54fea79a709958376bff681ca4f2c63e292d80e18b517ac9815ab585902cdd0831336ffd0c318b96955de948470900dbcb772c27a9da7d330d05697
-
SSDEEP
49152:QHgoyciELo8BJSstkpUbSkeQKyAWmDl8:
Static task
static1
Behavioral task
behavioral1
Sample
c7xdsg43_1.exe._2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
vshostupdater.duckdns.org:34357
newport1179.duckdns.org:34357
windowsbre.duckdns.org:34357
-
Install_directory
%AppData%
-
install_file
Windows Updater.exe
Targets
-
-
Target
c7xdsg43_1.exe._2.exe
-
Size
3.9MB
-
MD5
2e975b87f63c8dd384c803765d5d1c0b
-
SHA1
fdf785a15472093c6ff6228a4912076029eef54e
-
SHA256
08e348287c5287415442ccf3ce4ffef96d4a5d71f4d2de045e99f115db6c12b7
-
SHA512
dfdd0e57c54fea79a709958376bff681ca4f2c63e292d80e18b517ac9815ab585902cdd0831336ffd0c318b96955de948470900dbcb772c27a9da7d330d05697
-
SSDEEP
49152:QHgoyciELo8BJSstkpUbSkeQKyAWmDl8:
Score10/10-
Detect Xworm Payload
-
Modifies security service
-
Xworm family
-
Event Triggered Execution: Image File Execution Options Injection
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1