Overview
overview
10Static
static
1036.exe
windows7-x64
336.exe
windows10-2004-x64
3Enalib.exe
windows7-x64
10Enalib.exe
windows10-2004-x64
10RDriver.exe
windows7-x64
8RDriver.exe
windows10-2004-x64
8SDriver.exe
windows7-x64
3SDriver.exe
windows10-2004-x64
3T.exe
windows7-x64
10T.exe
windows10-2004-x64
10autoruns.exe
windows7-x64
3autoruns.exe
windows10-2004-x64
3e.exe
windows7-x64
10e.exe
windows10-2004-x64
10fake jpg shit.lnk
windows7-x64
10fake jpg shit.lnk
windows10-2004-x64
10fake photo.lnk
windows7-x64
3fake photo.lnk
windows10-2004-x64
7noyjhoadw.exe
windows7-x64
10noyjhoadw.exe
windows10-2004-x64
10unins000.exe
windows7-x64
3unins000.exe
windows10-2004-x64
3use for by...ck.exe
windows7-x64
8use for by...ck.exe
windows10-2004-x64
8Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 13:13
Behavioral task
behavioral1
Sample
36.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
36.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Enalib.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Enalib.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
RDriver.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
RDriver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SDriver.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SDriver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
T.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
T.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
autoruns.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
autoruns.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
fake jpg shit.lnk
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
fake jpg shit.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
fake photo.lnk
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
fake photo.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
noyjhoadw.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
noyjhoadw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
unins000.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
unins000.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
use for bypassing taskmgr block.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
use for bypassing taskmgr block.exe
Resource
win10v2004-20241007-en
General
-
Target
T.exe
-
Size
28KB
-
MD5
78fc1101948b2fd65e52e09f037bac45
-
SHA1
ba3fc0499ee83a3522c0d50d9faa8edcbd50ad44
-
SHA256
d3c5ed75f450a48329ca5647cb7d201ba347bd07138ee9b43716df56dd7a1dc2
-
SHA512
e89ffe3f5e15bbffd0cacf596439b622827fa9ca5eac2fcfd6617b84660673df18a0b50f27fda04310204f7501819865c54dc60a2ee092af8d5ce83ce4d048f4
-
SSDEEP
768:yQJGNK7vTOcsLqtcD9CHCQyYF4i5+kQjj3:9JGm6sHCQPMZjT
Malware Config
Extracted
xworm
5.0
WlO6Om8yfxIARVE4
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/7G6zzQwJ
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral10/memory/3696-32-0x0000000007DE0000-0x0000000007DF0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe Powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 17 pastebin.com 18 pastebin.com 20 pastebin.com 23 pastebin.com 29 pastebin.com 30 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 3696 T.exe 4232 Powershell.exe 4232 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3696 T.exe Token: SeDebugPrivilege 4232 Powershell.exe Token: SeDebugPrivilege 3696 T.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4232 3696 T.exe 83 PID 3696 wrote to memory of 4232 3696 T.exe 83 PID 3696 wrote to memory of 4232 3696 T.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\T.exe"C:\Users\Admin\AppData\Local\Temp\T.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -exec bypass -c Copy-Item 'C:\Users\Admin\AppData\Local\Temp\T.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe' -Force2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82