Analysis

  • max time kernel
    841s
  • max time network
    851s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2025 00:38

General

  • Target

    RES/XWorm.ServiceManager.resources

  • Size

    221KB

  • MD5

    776d31cf63f902ede47ccd1e09c463cd

  • SHA1

    a45e4761bc40019d6e5b72ece5d731c520d91303

  • SHA256

    fc7906c147eb0066e6cee2a528ab531b6d0ad1eb0b0a4d2a32a1be422809ecb9

  • SHA512

    f8f099d291b0ecab01d84d0c4f4480c7ea266cc79f1071d71c71ca3113f6c8594d82f192feb3b136be0e007542da1cc6a7b28b860bb3ee2e0e7747b75222bf0e

  • SSDEEP

    3072:VqR3kbym/bBGIgEJjHbD1yLHpkv+GhSx7BQFgfMyd9tbYLe7HkrVOih:lbJGcJj7D1cJkPhCprxbq9h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RES\XWorm.ServiceManager.resources
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RES\XWorm.ServiceManager.resources
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RES\XWorm.ServiceManager.resources"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    af979334198e2e1828714ac8a172deb5

    SHA1

    e58864335d9338ed2d0fa22ae2025983a46665c5

    SHA256

    480c48b08cae65ae060cf6bebbe48a97629e409e8ffbde79d354054777af12f2

    SHA512

    516d0a887df75090d73397589b2263fa21f87b4854859309d6c61e7f8aeabf1bf0457f8dffc3247d3c3789d0c3915e0f5a11424d25b7cfcfaecfa892a7b7aead