Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 09:41

General

  • Target

    2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe

  • Size

    2.7MB

  • MD5

    22403a447a2ad298ac6c0ae3411ccf6e

  • SHA1

    048d197addc2fc6b21396ae59a2356f73c6849ed

  • SHA256

    c94ed5203e2b65f5c0a198eff5a9d2d5b63d28a10dd5cf7f02997699b3ed3b41

  • SHA512

    430f4c95d67170dfe6cd8128a7af162fdd4465f1749700be386856ca44854405ea8c8ad56402c812410e84d97e9fdae7e272e6a694bb88333f0a9971520bc7c8

  • SSDEEP

    49152:N2Lw7+OiV22jWCFYz1d1AdtTySZf0K8lf/e:ELwSinsNZMblf/e

Malware Config

Extracted

Family

xworm

Version

3.1

C2

dost.mywire.org:7010

Mutex

Yv71yT1nY7oEZ9x1

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_22403a447a2ad298ac6c0ae3411ccf6e_frostygoop_snatch.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3728-5-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3728-12-0x0000000074FCE000-0x0000000074FCF000-memory.dmp

    Filesize

    4KB

  • memory/3728-13-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3728-14-0x0000000004E10000-0x0000000004EAC000-memory.dmp

    Filesize

    624KB

  • memory/3728-15-0x00000000056D0000-0x0000000005C74000-memory.dmp

    Filesize

    5.6MB

  • memory/3728-16-0x0000000074FC0000-0x0000000075770000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-17-0x0000000005D80000-0x0000000005E12000-memory.dmp

    Filesize

    584KB

  • memory/3728-18-0x0000000005690000-0x000000000569A000-memory.dmp

    Filesize

    40KB

  • memory/3728-19-0x0000000074FCE000-0x0000000074FCF000-memory.dmp

    Filesize

    4KB

  • memory/3728-20-0x0000000074FC0000-0x0000000075770000-memory.dmp

    Filesize

    7.7MB