Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 14:19

General

  • Target

    UPS tracking details.exe

  • Size

    851KB

  • MD5

    28badf3eb1aa6ce975fee86e6ec1dc14

  • SHA1

    8f19c7dbdde308e463b0412d73ea7083b1bcc816

  • SHA256

    7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e

  • SHA512

    eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e

  • SSDEEP

    12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

56TvElZMbqDoRvU7

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe
        "C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4068
      • C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe
        "C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:6080
        • C:\Users\Admin\AppData\Local\Temp\icpnub.exe
          "C:\Users\Admin\AppData\Local\Temp\icpnub.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4476
      • C:\Users\Admin\AppData\Local\Temp\icpnub.exe
        "C:\Users\Admin\AppData\Local\Temp\icpnub.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\icpnub.exe

      Filesize

      851KB

      MD5

      c0a50e2d3eeaea373b5a9f5b029b7487

      SHA1

      118a21295bfa0e6f6aad3ef8dffed967028872c8

      SHA256

      5ed36ab3f8243cc7adcbae0f26759e1877643b553e744f800e3dc3561a315586

      SHA512

      35e14aa13c2f01bf85f756ca81b5f6de7f3665830ad919772efd6128a082d476c8cfe5a7b8d659d10aaae7fba7a704e99ec3059c8c477a2970f68cc241f765f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs

      Filesize

      84B

      MD5

      653f5c1d2324fc1b05ef57c9cbb50aef

      SHA1

      211d276ced44ccb913c6dc3b0c105ec9ba05a1ba

      SHA256

      6d5c05293e79f123a27b49d29ecba56c92906d7011659d088e52fe4267cb434b

      SHA512

      7da31cc32d8b45c18819c1c13166a22c4909ff602ff7ae1658b295360d823dc6b2ef6a00f5fda5b21e037dfff7627dce8126eb6c366ac443755fa63f9407bee7

    • \??\c:\users\admin\appdata\roaming\remaining.exe

      Filesize

      851KB

      MD5

      6164d0754f346ce79cc3aded624b574f

      SHA1

      eeee2ab483fc7d301b4936891c4160e1c38609dc

      SHA256

      21510f702e7c54434cd5d11912029c579721d8a59cde4f229f3472a98dfb0a69

      SHA512

      c38147be7159e86a7470147659b5bea6be8db33a7bdb823ffa1ce358a0ef64543a7ae5297c09c057d40588184f5da9f5e29d83e7ea446877130e06f992324056

    • memory/4068-19-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-15-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-5-0x00000000059E0000-0x0000000005AE0000-memory.dmp

      Filesize

      1024KB

    • memory/4068-6-0x0000000006090000-0x0000000006634000-memory.dmp

      Filesize

      5.6MB

    • memory/4068-7-0x0000000005BE0000-0x0000000005C72000-memory.dmp

      Filesize

      584KB

    • memory/4068-17-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-13-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-71-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-11-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-67-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-65-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-63-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-61-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-59-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-57-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-55-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-53-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-51-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-49-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-45-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-43-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-41-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-39-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-37-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-35-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-8-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-31-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-30-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-27-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-47-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-25-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-23-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-21-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-0-0x000000007488E000-0x000000007488F000-memory.dmp

      Filesize

      4KB

    • memory/4068-69-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-4-0x00000000050A0000-0x00000000050AA000-memory.dmp

      Filesize

      40KB

    • memory/4068-33-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-9-0x00000000059E0000-0x0000000005ADB000-memory.dmp

      Filesize

      1004KB

    • memory/4068-1330-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1331-0x0000000005DD0000-0x0000000005E2C000-memory.dmp

      Filesize

      368KB

    • memory/4068-1332-0x0000000005FA0000-0x0000000005FF8000-memory.dmp

      Filesize

      352KB

    • memory/4068-1333-0x0000000006640000-0x000000000668C000-memory.dmp

      Filesize

      304KB

    • memory/4068-1334-0x000000007488E000-0x000000007488F000-memory.dmp

      Filesize

      4KB

    • memory/4068-1335-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1336-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1337-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1338-0x00000000066F0000-0x0000000006744000-memory.dmp

      Filesize

      336KB

    • memory/4068-1344-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1346-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1348-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-1-0x00000000006D0000-0x00000000007AC000-memory.dmp

      Filesize

      880KB

    • memory/4068-1349-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-2-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-3-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-2697-0x0000000005860000-0x00000000058F8000-memory.dmp

      Filesize

      608KB

    • memory/4476-1373-0x0000000005240000-0x0000000005382000-memory.dmp

      Filesize

      1.3MB

    • memory/4476-1371-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-2710-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-2699-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-1368-0x0000000000030000-0x000000000010C000-memory.dmp

      Filesize

      880KB

    • memory/4476-1369-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-2698-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-1370-0x0000000004900000-0x000000000490A000-memory.dmp

      Filesize

      40KB

    • memory/4476-1372-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-2696-0x0000000005670000-0x000000000570C000-memory.dmp

      Filesize

      624KB

    • memory/6080-1355-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/6080-1354-0x0000000005120000-0x0000000005186000-memory.dmp

      Filesize

      408KB

    • memory/6080-1353-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/6080-1365-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/6080-1352-0x0000000004A90000-0x0000000004B2C000-memory.dmp

      Filesize

      624KB

    • memory/6080-1350-0x0000000074880000-0x0000000075030000-memory.dmp

      Filesize

      7.7MB

    • memory/6080-1351-0x0000000000590000-0x000000000059E000-memory.dmp

      Filesize

      56KB