General
-
Target
5c9484c214c6f96f2a0a64afa4985f0d5534607ccaec60020cdf013c77531a78
-
Size
537KB
-
Sample
250227-2z5w2asvhy
-
MD5
860d8ceb275dbe815c23d2eb7be82335
-
SHA1
f2788bacf9aa9961ab5bde20bf2ade879fcdd7f4
-
SHA256
5c9484c214c6f96f2a0a64afa4985f0d5534607ccaec60020cdf013c77531a78
-
SHA512
faaa066dcc93d7e3ecc9d222ab39594b113d168ebcf14b7d317810a6bf7f09093273f7f0ca0457320bdc0b101fcfcdbf283bb8c519fb5e269ac62e4f887fde67
-
SSDEEP
12288:0aa32LOEqkBgU+BHCWGzhCWOcDQWSrRofZuFrJuDb:DLLOUBgjBHCvCXWSNohuZ0Db
Static task
static1
Behavioral task
behavioral1
Sample
WEN.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
176.96.137.181:2222
-
Install_directory
%AppData%
-
install_file
XClient2.exe
Targets
-
-
Target
WEN.exe
-
Size
954KB
-
MD5
64100e4131cedaf6a889f560bc1e1c9b
-
SHA1
55f98aa796e01cea2cfd714770d974b9316bd848
-
SHA256
d4746c577ffb7985fc33252c77365679a6a39b68e4c0f3c60fd27d34a7539ebe
-
SHA512
ebcd5712c614a57dbb29539c8271b8adb23ab4615aa5b239b8eb59ef8fab458cd20154befcdb7fbdea19e7650ed14a14c8822662ffb70f4dba3e2a4e2d4177ad
-
SSDEEP
24576:+u6J33O0c+JY5UZ+XC0kGso6FaOYF0DuyKWY:Qu0c++OCvkGs9FaOnqmY
-
Detect Xworm Payload
-
Xenarmor family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1