Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 07:44

General

  • Target

    UPS tracking details.exe

  • Size

    851KB

  • MD5

    28badf3eb1aa6ce975fee86e6ec1dc14

  • SHA1

    8f19c7dbdde308e463b0412d73ea7083b1bcc816

  • SHA256

    7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e

  • SHA512

    eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e

  • SSDEEP

    12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

56TvElZMbqDoRvU7

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3556
      • C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe
        "C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1060
      • C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe
        "C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\bntmwe.exe
          "C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3988
      • C:\Users\Admin\AppData\Local\Temp\bntmwe.exe
        "C:\Users\Admin\AppData\Local\Temp\bntmwe.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bntmwe.exe

      Filesize

      851KB

      MD5

      c0a50e2d3eeaea373b5a9f5b029b7487

      SHA1

      118a21295bfa0e6f6aad3ef8dffed967028872c8

      SHA256

      5ed36ab3f8243cc7adcbae0f26759e1877643b553e744f800e3dc3561a315586

      SHA512

      35e14aa13c2f01bf85f756ca81b5f6de7f3665830ad919772efd6128a082d476c8cfe5a7b8d659d10aaae7fba7a704e99ec3059c8c477a2970f68cc241f765f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs

      Filesize

      84B

      MD5

      653f5c1d2324fc1b05ef57c9cbb50aef

      SHA1

      211d276ced44ccb913c6dc3b0c105ec9ba05a1ba

      SHA256

      6d5c05293e79f123a27b49d29ecba56c92906d7011659d088e52fe4267cb434b

      SHA512

      7da31cc32d8b45c18819c1c13166a22c4909ff602ff7ae1658b295360d823dc6b2ef6a00f5fda5b21e037dfff7627dce8126eb6c366ac443755fa63f9407bee7

    • \??\c:\users\admin\appdata\roaming\remaining.exe

      Filesize

      192KB

      MD5

      9834ceb914fd2fb76879ffd998eda169

      SHA1

      888e9a99ea850fb7ac91c846d1250e4b186dcb67

      SHA256

      bbb5afbcbff454872d04b0b800798cf615418143c48988cc3e003762cd7800a0

      SHA512

      29fa5038a3ac4d3939d73bd09cbcaf510aefdc1d97ea7c9b657d4a61d1f79d0013265181851bd026ad85b08b85ecadd2ba6ba620b9d20a4269d1902b79e90669

    • memory/1060-67-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-63-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-6-0x0000000005E20000-0x00000000063C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1060-7-0x0000000005970000-0x0000000005A02000-memory.dmp

      Filesize

      584KB

    • memory/1060-35-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-53-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-55-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-51-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-49-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-47-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-45-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-43-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-41-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-39-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-37-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-29-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-27-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-25-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-23-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-33-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-31-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-21-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-19-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-17-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-15-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-13-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-12-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-10-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-8-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-61-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-71-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-69-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-59-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

      Filesize

      4KB

    • memory/1060-3-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-65-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-1349-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-5-0x0000000005770000-0x0000000005870000-memory.dmp

      Filesize

      1024KB

    • memory/1060-1330-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1332-0x0000000005D30000-0x0000000005D88000-memory.dmp

      Filesize

      352KB

    • memory/1060-1333-0x00000000063D0000-0x000000000641C000-memory.dmp

      Filesize

      304KB

    • memory/1060-1331-0x0000000005B60000-0x0000000005BBC000-memory.dmp

      Filesize

      368KB

    • memory/1060-1335-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1334-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

      Filesize

      4KB

    • memory/1060-1336-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1337-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1338-0x0000000006480000-0x00000000064D4000-memory.dmp

      Filesize

      336KB

    • memory/1060-1346-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1344-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-57-0x0000000005770000-0x000000000586B000-memory.dmp

      Filesize

      1004KB

    • memory/1060-1-0x0000000000460000-0x000000000053C000-memory.dmp

      Filesize

      880KB

    • memory/1060-2-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-1348-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1060-4-0x0000000004E30000-0x0000000004E3A000-memory.dmp

      Filesize

      40KB

    • memory/2720-1353-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2720-1354-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2720-1355-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2720-1356-0x0000000005170000-0x00000000051D6000-memory.dmp

      Filesize

      408KB

    • memory/2720-1352-0x0000000004970000-0x0000000004A0C000-memory.dmp

      Filesize

      624KB

    • memory/2720-1351-0x00000000001E0000-0x00000000001EE000-memory.dmp

      Filesize

      56KB

    • memory/2720-1350-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3988-1372-0x00000000057F0000-0x0000000005932000-memory.dmp

      Filesize

      1.3MB

    • memory/3988-1370-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3988-1371-0x0000000002A30000-0x0000000002A3A000-memory.dmp

      Filesize

      40KB

    • memory/3988-2695-0x0000000005AF0000-0x0000000005B8C000-memory.dmp

      Filesize

      624KB

    • memory/3988-2696-0x0000000005CE0000-0x0000000005D78000-memory.dmp

      Filesize

      608KB

    • memory/3988-2697-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3988-2698-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3988-1368-0x00000000005B0000-0x000000000068C000-memory.dmp

      Filesize

      880KB

    • memory/3988-1369-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3988-2709-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB