General
-
Target
e.exe
-
Size
501KB
-
Sample
250302-b346sszny4
-
MD5
851315103d9c8a23701e5866aa809bf7
-
SHA1
728584af10cceecd2975f6bf7911d74aa69112fc
-
SHA256
07fcf2d9af558e53ccd2f47c1c008782c14fa00f75ebde1ccdfe8c1b9f45adf8
-
SHA512
a20ec7d22cbd4135371d88cf92f7f767513406f2b25fe468003930380d6a07be2c8bc3c63c667c2b636edf18be104cc75a33290f2dbdc045c59a21ae51f5402d
-
SSDEEP
12288:01Vi3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:7kGTy
Static task
static1
Behavioral task
behavioral1
Sample
e.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
communication-xl.gl.at.ply.gg:36476
rFF9OgJ4l9HAkScN
-
Install_directory
%Public%
-
install_file
XClient.exe
Targets
-
-
Target
e.exe
-
Size
501KB
-
MD5
851315103d9c8a23701e5866aa809bf7
-
SHA1
728584af10cceecd2975f6bf7911d74aa69112fc
-
SHA256
07fcf2d9af558e53ccd2f47c1c008782c14fa00f75ebde1ccdfe8c1b9f45adf8
-
SHA512
a20ec7d22cbd4135371d88cf92f7f767513406f2b25fe468003930380d6a07be2c8bc3c63c667c2b636edf18be104cc75a33290f2dbdc045c59a21ae51f5402d
-
SSDEEP
12288:01Vi3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:7kGTy
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Pre-OS Boot
1Bootkit
1