Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/03/2025, 12:19

General

  • Target

    injector-helper.exe

  • Size

    184KB

  • MD5

    c777067925c4275efccd6e31750b2a4d

  • SHA1

    52259a1bf97340490e0208145bb8c666e07c31f9

  • SHA256

    435011ebed0c301de1847935c54d9b80a4c279e380413d207febd895e8164e3f

  • SHA512

    0ad92779cc0073089d8c7c252eab1ff5e8ddafab9aa6a0391c41625a40a6ca46dd228bd3a36e0aaa399bd89b22e7fb09bc6bcb2f27c7e5f89b75a5798b22ce85

  • SSDEEP

    3072:P567FmwoIb5iz+bIOVMQMGxO1VjBz65/M6If+3Js+3JFkKeTno:P5im6iKbYjxBt25

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/kADeGNZE

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector-helper.exe
    "C:\Users\Admin\AppData\Local\Temp\injector-helper.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\injector-helper.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5000
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector-helper.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2100
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:1716
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4008
  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Executes dropped EXE
    PID:2016
  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:4476
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:2076
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:3448
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:1000
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    3eb3833f769dd890afc295b977eab4b4

    SHA1

    e857649b037939602c72ad003e5d3698695f436f

    SHA256

    c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

    SHA512

    c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

    Filesize

    654B

    MD5

    11c6e74f0561678d2cf7fc075a6cc00c

    SHA1

    535ee79ba978554abcb98c566235805e7ea18490

    SHA256

    d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

    SHA512

    32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    13e75a3f969f37dc72fd4852bdc7083c

    SHA1

    7dddedb04f386a47666202ca6597d90a2a04aad1

    SHA256

    f6c41d71efdb8e40b75efeeb26cfa0ad2789082baf128aee3a5dca26409077cf

    SHA512

    b92b49d957a2726b5001d515495a74f175965212da6c54d5fe6e4d35d8d5f6e38eccd3501dba1b26ac67ff86ffd9ceb1a34a6e0402417fd7583eca47a57dbd07

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    99199f0dca5c84eac4de42c111d371a1

    SHA1

    d1cc7081758d7a10b74803b57afeb4d54915095c

    SHA256

    507312151bf33d8012c2ffe2839ba8359cb89c1f4a7042c620d3776bf2687986

    SHA512

    c5305c133200f55e11864e252ac74b5041e6af6716bdde04410a27550647ca0231ca135c4de92a9b9e249da45feb6fab0c13ba53e1c8deb8b60b2e65431622da

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    c4addaa9e337d1870c96fd8196f5e63c

    SHA1

    ad609b00b9478e3e8db001ffd7aa7db1282f6bb5

    SHA256

    a0963412354873fe9c26b170841914b9c2b89307b3fbe90b5a1f502d1ab988d8

    SHA512

    96a136ea06b6eb221ccc7d3c1d30c46b2892ea69067ab657ce329a9be5bd0577a455d6e206ef32c044bb6dbf198074a66645484e5b4884900ac2380748b39cbf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    60b3262c3163ee3d466199160b9ed07d

    SHA1

    994ece4ea4e61de0be2fdd580f87e3415f9e1ff6

    SHA256

    e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb

    SHA512

    081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    659758516c38937acaf2cb4a8949a801

    SHA1

    ee4515ef9e8f2dfdcb75f778bc863138db79acb2

    SHA256

    f7258d776aac35c77baa6f3c71e25a933617b8ab33cdfa5d3d1e652902ad73ee

    SHA512

    d7cd73734cd1cc1894ad176a8d8915d66e489a1ef09562be6f9e3a0aadeceaa88b6700ad223550da8a22766f98af1e12d961a15ee1f2d38408fdd60ddc0a51ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    8a8dc775649664c3a2f5fa27a58f3a0c

    SHA1

    d6ab95aa1173b3905a5331d3b64c1bd468ffc483

    SHA256

    c98a5947c75bda96ad9426a9cf026ed75bcfb0f40d54b0f31f5057cc9b54d1dd

    SHA512

    29ad925827808c18dc114082af81c7a2bc5e82270437d49f8328939abe0a1387ff9c6226e98703c3dba2e67eb3108b4de990bc8985a3e68b0e40c92ba4ac9e91

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    820b1ea0ac6e2e68c17734619a284042

    SHA1

    766bbc68e81458f130b1ff0b7905fa5e665e455e

    SHA256

    108677259743f72f8bb9dedeed2e94c78d3ebebec816c1dfa8848e5818527f5e

    SHA512

    4b2368ad62f6e2d301ef12a9b1db88ae887e536a5aa49d6555fafbc8f81747c29e3435673feefa99ef1b5950ba29aba2aa4fcf9de43c881fcca3aba752bdbb19

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ulb1ng22.iis.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    184KB

    MD5

    c777067925c4275efccd6e31750b2a4d

    SHA1

    52259a1bf97340490e0208145bb8c666e07c31f9

    SHA256

    435011ebed0c301de1847935c54d9b80a4c279e380413d207febd895e8164e3f

    SHA512

    0ad92779cc0073089d8c7c252eab1ff5e8ddafab9aa6a0391c41625a40a6ca46dd228bd3a36e0aaa399bd89b22e7fb09bc6bcb2f27c7e5f89b75a5798b22ce85

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk

    Filesize

    1KB

    MD5

    dc4d883f0777d28fd65225eb1960171a

    SHA1

    e26f630c316de3382ec09fb9670857340f4e8a38

    SHA256

    5279182a711e0e7e68bf8842cfec262d3a60773c1b690b31b0f6f4c49eba03d1

    SHA512

    d6ad08fd902451118e8975929346ff743ae77cb65c25326c1d6d5971807fb3103e844c0062e2996814d37cf072428d04629e3118e3164206f9d0c53adfdc1cc3

  • memory/2096-58-0x00007FF981B03000-0x00007FF981B05000-memory.dmp

    Filesize

    8KB

  • memory/2096-77-0x000000001C040000-0x000000001C13F000-memory.dmp

    Filesize

    1020KB

  • memory/2096-0-0x00007FF981B03000-0x00007FF981B05000-memory.dmp

    Filesize

    8KB

  • memory/2096-59-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/2096-60-0x000000001C040000-0x000000001C13F000-memory.dmp

    Filesize

    1020KB

  • memory/2096-61-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/2096-1-0x0000000000B80000-0x0000000000BB4000-memory.dmp

    Filesize

    208KB

  • memory/2096-78-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/2768-127-0x000000001C3F0000-0x000000001C3FC000-memory.dmp

    Filesize

    48KB

  • memory/5000-18-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/5000-15-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/5000-14-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/5000-13-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/5000-12-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB

  • memory/5000-11-0x000001C734F50000-0x000001C734F72000-memory.dmp

    Filesize

    136KB

  • memory/5000-19-0x00007FF981B00000-0x00007FF9825C2000-memory.dmp

    Filesize

    10.8MB