Analysis
-
max time kernel
129s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe
Resource
win7-20240903-en
General
-
Target
bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe
-
Size
10KB
-
MD5
a69ad9d0fb5bdf7ea93dbfca99495d80
-
SHA1
b3dc5cd3283982a73153e72ec76dd08060f40b8f
-
SHA256
bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37
-
SHA512
d16faf32a85e68f0d42328ae0163e24a1aaf2538f35de57e2a6524e96be9274a730d887f14d72fe7c9914c4dadcf06f160d7ab95e8f8daf676e508a32c201fbc
-
SSDEEP
96:YkdSfY8xVcZbqvLV1FKBh1gf4oSU26z2Eg8Qjh0awDabXrVLZD+t8EM/cRV7kPzj:YTvVMuV1o+f4qu8Qh7wDarrX+u/w6
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3916-1347-0x00000000003D0000-0x00000000003DE000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3740 created 3548 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 56 -
Xworm family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sign.vbs bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3740 set thread context of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe Token: SeDebugPrivilege 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe Token: SeDebugPrivilege 3916 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98 PID 3740 wrote to memory of 3916 3740 bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe"C:\Users\Admin\AppData\Local\Temp\bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe"C:\Users\Admin\AppData\Local\Temp\bad755124567617e4879874ad80ef2a54b6d6bb69c9da57f7073320d91759e37.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3916
-