Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 02:07
Behavioral task
behavioral1
Sample
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe
Resource
win10v2004-20250217-en
General
-
Target
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe
-
Size
82KB
-
MD5
b201ce5dcb58284da7a5ef6294418e56
-
SHA1
27573051f80debfd74e1a72d27cfd29f58c76d7e
-
SHA256
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
-
SHA512
f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c
-
SSDEEP
1536:D2wgD0/WhgBpRCn3wtSD+bQ6QqTMj34Al6G4tIzOasNnP6UO:ywkeWQCn1+bQdjrytuOa6Sz
Malware Config
Extracted
xworm
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2280-1-0x0000000000260000-0x000000000027A000-memory.dmp family_xworm behavioral1/files/0x000b00000001227e-35.dat family_xworm behavioral1/memory/236-37-0x00000000012B0000-0x00000000012CA000-memory.dmp family_xworm behavioral1/memory/2492-40-0x0000000001330000-0x000000000134A000-memory.dmp family_xworm behavioral1/memory/928-42-0x0000000000230000-0x000000000024A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2776 powershell.exe 2912 powershell.exe 2144 powershell.exe 2732 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe -
Executes dropped EXE 3 IoCs
pid Process 236 SolaraX.exe 2492 SolaraX.exe 928 SolaraX.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SolaraX = "C:\\Users\\Admin\\AppData\\Roaming\\SolaraX.exe" 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2776 powershell.exe 2912 powershell.exe 2144 powershell.exe 2732 powershell.exe 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe Token: SeDebugPrivilege 236 SolaraX.exe Token: SeDebugPrivilege 2492 SolaraX.exe Token: SeDebugPrivilege 928 SolaraX.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2776 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 29 PID 2280 wrote to memory of 2776 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 29 PID 2280 wrote to memory of 2776 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 29 PID 2280 wrote to memory of 2912 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 31 PID 2280 wrote to memory of 2912 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 31 PID 2280 wrote to memory of 2912 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 31 PID 2280 wrote to memory of 2144 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 33 PID 2280 wrote to memory of 2144 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 33 PID 2280 wrote to memory of 2144 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 33 PID 2280 wrote to memory of 2732 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 35 PID 2280 wrote to memory of 2732 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 35 PID 2280 wrote to memory of 2732 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 35 PID 2280 wrote to memory of 2428 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 37 PID 2280 wrote to memory of 2428 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 37 PID 2280 wrote to memory of 2428 2280 188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe 37 PID 2676 wrote to memory of 236 2676 taskeng.exe 41 PID 2676 wrote to memory of 236 2676 taskeng.exe 41 PID 2676 wrote to memory of 236 2676 taskeng.exe 41 PID 2676 wrote to memory of 2492 2676 taskeng.exe 42 PID 2676 wrote to memory of 2492 2676 taskeng.exe 42 PID 2676 wrote to memory of 2492 2676 taskeng.exe 42 PID 2676 wrote to memory of 928 2676 taskeng.exe 43 PID 2676 wrote to memory of 928 2676 taskeng.exe 43 PID 2676 wrote to memory of 928 2676 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe"C:\Users\Admin\AppData\Local\Temp\188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SolaraX" /tr "C:\Users\Admin\AppData\Roaming\SolaraX.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2428
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F60377C6-5D20-432B-A963-9102C490EB66} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a5ddcf1402d9ec4813fb0bbe9e9ffe9e
SHA10359f9fdeace270a74255d550a97cedb65d47ac4
SHA256fed7da580254b31699cc30e47558bc5608e6044c40bb016a43c97f29a6aba95f
SHA5122101b838ca16f6dae87a6e7cf0ce4fca314fa62ede3c614a49a3713ecbf03cb99e7ed585f77d8c1944af89e926135e19d25d869ca8ef29a616ee001191320238
-
Filesize
82KB
MD5b201ce5dcb58284da7a5ef6294418e56
SHA127573051f80debfd74e1a72d27cfd29f58c76d7e
SHA256188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
SHA512f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c