General
-
Target
test.txt
-
Size
18B
-
Sample
250223-ll5q4ssry3
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Static task
static1
Behavioral task
behavioral1
Sample
test.txt
Resource
win11-20250218-en
Malware Config
Extracted
xworm
printer-foundations.gl.at.ply.gg:443
printer-foundations.gl.at.ply.gg:44421:443
sadsadsd-26556.portmap.host:443
sadsadsd-26556.portmap.host:26556:443
printer-foundations.gl.at.ply.gg:1
printer-foundations.gl.at.ply.gg:44421:1
sadsadsd-26556.portmap.host:1
sadsadsd-26556.portmap.host:26556:1
printer-foundations.gl.at.ply.gg:44421
printer-foundations.gl.at.ply.gg:44421:44421
sadsadsd-26556.portmap.host:44421
sadsadsd-26556.portmap.host:26556:44421
printer-foundations.gl.at.ply.gg:26556
printer-foundations.gl.at.ply.gg:44421:26556
sadsadsd-26556.portmap.host:26556
sadsadsd-26556.portmap.host:26556:26556
-
install_file
USB.exe
Extracted
xworm
5.0
sadsadsd-26556.portmap.host:26556
4oiY4RLjbkMvhKam
-
install_file
USB.exe
Targets
-
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Disables service(s)
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
StormKitty payload
-
Stormkitty family
-
UAC bypass
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies boot configuration data using bcdedit
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Modifies Windows Firewall
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
3File Deletion
2Network Share Connection Removal
1Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1