Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 09:41

General

  • Target

    2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe

  • Size

    2.7MB

  • MD5

    22403a447a2ad298ac6c0ae3411ccf6e

  • SHA1

    048d197addc2fc6b21396ae59a2356f73c6849ed

  • SHA256

    c94ed5203e2b65f5c0a198eff5a9d2d5b63d28a10dd5cf7f02997699b3ed3b41

  • SHA512

    430f4c95d67170dfe6cd8128a7af162fdd4465f1749700be386856ca44854405ea8c8ad56402c812410e84d97e9fdae7e272e6a694bb88333f0a9971520bc7c8

  • SSDEEP

    49152:N2Lw7+OiV22jWCFYz1d1AdtTySZf0K8lf/e:ELwSinsNZMblf/e

Malware Config

Extracted

Family

xworm

Version

3.1

C2

dost.mywire.org:7010

Mutex

Yv71yT1nY7oEZ9x1

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2808-5-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2808-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2808-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2808-16-0x000000007494E000-0x000000007494F000-memory.dmp

    Filesize

    4KB

  • memory/2808-6-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2808-17-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/2808-18-0x000000007494E000-0x000000007494F000-memory.dmp

    Filesize

    4KB

  • memory/2808-19-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB