General
-
Target
vaJBMLa9PX3g4P8.exe
-
Size
86KB
-
Sample
250126-q2k4vstqgr
-
MD5
52b32b4d4e7f2b918eceda96cb755e41
-
SHA1
efc17704ec1e32f4228c7ba030b70ba2b5113837
-
SHA256
2c99b1f642afde5a77d480ce56dd3f9c3e3d248004557fde144f28d75cc96595
-
SHA512
8ebc502e2a6ddd5d050bc7c5350ec51f07576c2c6a31b5f82b87c3e3d979ff3ba090006eeb0a8dbc531bc66ea8968152af8e40cb938790124b8bb39ae2b39cc4
-
SSDEEP
1536:e38SRAo+1qDQHBoJBng+foNW2hLUAjYeHEqIALZiAg4b8jBTjD:e38SRR+oiong+ANWUz+HAg4glTf
Static task
static1
Behavioral task
behavioral1
Sample
vaJBMLa9PX3g4P8.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
Steam.exe
Targets
-
-
Target
vaJBMLa9PX3g4P8.exe
-
Size
86KB
-
MD5
52b32b4d4e7f2b918eceda96cb755e41
-
SHA1
efc17704ec1e32f4228c7ba030b70ba2b5113837
-
SHA256
2c99b1f642afde5a77d480ce56dd3f9c3e3d248004557fde144f28d75cc96595
-
SHA512
8ebc502e2a6ddd5d050bc7c5350ec51f07576c2c6a31b5f82b87c3e3d979ff3ba090006eeb0a8dbc531bc66ea8968152af8e40cb938790124b8bb39ae2b39cc4
-
SSDEEP
1536:e38SRAo+1qDQHBoJBng+foNW2hLUAjYeHEqIALZiAg4b8jBTjD:e38SRR+oiong+ANWUz+HAg4glTf
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1