Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
UPS tracking details.exe
Resource
win7-20240903-en
General
-
Target
UPS tracking details.exe
-
Size
851KB
-
MD5
28badf3eb1aa6ce975fee86e6ec1dc14
-
SHA1
8f19c7dbdde308e463b0412d73ea7083b1bcc816
-
SHA256
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e
-
SHA512
eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e
-
SSDEEP
12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2720-1351-0x00000000001E0000-0x00000000001EE000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1060 created 3556 1060 UPS tracking details.exe 56 PID 3988 created 3556 3988 bntmwe.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation UPS tracking details.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs UPS tracking details.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs bntmwe.exe -
Executes dropped EXE 2 IoCs
pid Process 3988 bntmwe.exe 844 bntmwe.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1060 set thread context of 2720 1060 UPS tracking details.exe 94 PID 3988 set thread context of 844 3988 bntmwe.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntmwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1060 UPS tracking details.exe 1060 UPS tracking details.exe 1060 UPS tracking details.exe 3988 bntmwe.exe 3988 bntmwe.exe 3988 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe 844 bntmwe.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1060 UPS tracking details.exe Token: SeDebugPrivilege 1060 UPS tracking details.exe Token: SeDebugPrivilege 2720 UPS tracking details.exe Token: SeDebugPrivilege 3988 bntmwe.exe Token: SeDebugPrivilege 3988 bntmwe.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 1060 wrote to memory of 2720 1060 UPS tracking details.exe 94 PID 2720 wrote to memory of 3988 2720 UPS tracking details.exe 104 PID 2720 wrote to memory of 3988 2720 UPS tracking details.exe 104 PID 2720 wrote to memory of 3988 2720 UPS tracking details.exe 104 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105 PID 3988 wrote to memory of 844 3988 bntmwe.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5c0a50e2d3eeaea373b5a9f5b029b7487
SHA1118a21295bfa0e6f6aad3ef8dffed967028872c8
SHA2565ed36ab3f8243cc7adcbae0f26759e1877643b553e744f800e3dc3561a315586
SHA51235e14aa13c2f01bf85f756ca81b5f6de7f3665830ad919772efd6128a082d476c8cfe5a7b8d659d10aaae7fba7a704e99ec3059c8c477a2970f68cc241f765f2
-
Filesize
84B
MD5653f5c1d2324fc1b05ef57c9cbb50aef
SHA1211d276ced44ccb913c6dc3b0c105ec9ba05a1ba
SHA2566d5c05293e79f123a27b49d29ecba56c92906d7011659d088e52fe4267cb434b
SHA5127da31cc32d8b45c18819c1c13166a22c4909ff602ff7ae1658b295360d823dc6b2ef6a00f5fda5b21e037dfff7627dce8126eb6c366ac443755fa63f9407bee7
-
Filesize
192KB
MD59834ceb914fd2fb76879ffd998eda169
SHA1888e9a99ea850fb7ac91c846d1250e4b186dcb67
SHA256bbb5afbcbff454872d04b0b800798cf615418143c48988cc3e003762cd7800a0
SHA51229fa5038a3ac4d3939d73bd09cbcaf510aefdc1d97ea7c9b657d4a61d1f79d0013265181851bd026ad85b08b85ecadd2ba6ba620b9d20a4269d1902b79e90669