General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
xworm
Version
5.0
Mutex
gLXBFwOrGsx6hRJl
Attributes
-
Install_directory
%AppData%
-
install_file
Edgeupdater.exe
-
pastebin_url
https://pastebin.com/raw/MNz8CDNG
aes.plain
Targets
-
-
Detect Xworm Payload
-
UAC bypass
-
Windows security bypass
-
Xworm family
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Windows security modification
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2