Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
UPS tracking details.exe
Resource
win7-20241010-en
General
-
Target
UPS tracking details.exe
-
Size
851KB
-
MD5
28badf3eb1aa6ce975fee86e6ec1dc14
-
SHA1
8f19c7dbdde308e463b0412d73ea7083b1bcc816
-
SHA256
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e
-
SHA512
eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e
-
SSDEEP
12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/6080-1351-0x0000000000590000-0x000000000059E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4068 created 3564 4068 UPS tracking details.exe 56 PID 4476 created 3564 4476 icpnub.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation UPS tracking details.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs UPS tracking details.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs icpnub.exe -
Executes dropped EXE 2 IoCs
pid Process 4476 icpnub.exe 4644 icpnub.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4068 set thread context of 6080 4068 UPS tracking details.exe 97 PID 4476 set thread context of 4644 4476 icpnub.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icpnub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4068 UPS tracking details.exe 4068 UPS tracking details.exe 4068 UPS tracking details.exe 4476 icpnub.exe 4476 icpnub.exe 4476 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe 4644 icpnub.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4068 UPS tracking details.exe Token: SeDebugPrivilege 4068 UPS tracking details.exe Token: SeDebugPrivilege 6080 UPS tracking details.exe Token: SeDebugPrivilege 4476 icpnub.exe Token: SeDebugPrivilege 4476 icpnub.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 4068 wrote to memory of 6080 4068 UPS tracking details.exe 97 PID 6080 wrote to memory of 4476 6080 UPS tracking details.exe 102 PID 6080 wrote to memory of 4476 6080 UPS tracking details.exe 102 PID 6080 wrote to memory of 4476 6080 UPS tracking details.exe 102 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110 PID 4476 wrote to memory of 4644 4476 icpnub.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6080 -
C:\Users\Admin\AppData\Local\Temp\icpnub.exe"C:\Users\Admin\AppData\Local\Temp\icpnub.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476
-
-
-
C:\Users\Admin\AppData\Local\Temp\icpnub.exe"C:\Users\Admin\AppData\Local\Temp\icpnub.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5c0a50e2d3eeaea373b5a9f5b029b7487
SHA1118a21295bfa0e6f6aad3ef8dffed967028872c8
SHA2565ed36ab3f8243cc7adcbae0f26759e1877643b553e744f800e3dc3561a315586
SHA51235e14aa13c2f01bf85f756ca81b5f6de7f3665830ad919772efd6128a082d476c8cfe5a7b8d659d10aaae7fba7a704e99ec3059c8c477a2970f68cc241f765f2
-
Filesize
84B
MD5653f5c1d2324fc1b05ef57c9cbb50aef
SHA1211d276ced44ccb913c6dc3b0c105ec9ba05a1ba
SHA2566d5c05293e79f123a27b49d29ecba56c92906d7011659d088e52fe4267cb434b
SHA5127da31cc32d8b45c18819c1c13166a22c4909ff602ff7ae1658b295360d823dc6b2ef6a00f5fda5b21e037dfff7627dce8126eb6c366ac443755fa63f9407bee7
-
Filesize
851KB
MD56164d0754f346ce79cc3aded624b574f
SHA1eeee2ab483fc7d301b4936891c4160e1c38609dc
SHA25621510f702e7c54434cd5d11912029c579721d8a59cde4f229f3472a98dfb0a69
SHA512c38147be7159e86a7470147659b5bea6be8db33a7bdb823ffa1ce358a0ef64543a7ae5297c09c057d40588184f5da9f5e29d83e7ea446877130e06f992324056