Analysis
-
max time kernel
100s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
UPS tracking details.exe
Resource
win7-20241023-en
General
-
Target
UPS tracking details.exe
-
Size
851KB
-
MD5
28badf3eb1aa6ce975fee86e6ec1dc14
-
SHA1
8f19c7dbdde308e463b0412d73ea7083b1bcc816
-
SHA256
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e
-
SHA512
eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e
-
SSDEEP
12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1660-1351-0x00000000003E0000-0x00000000003EE000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 492 created 3432 492 UPS tracking details.exe 56 PID 692 created 3432 692 xciqtd.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation UPS tracking details.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs xciqtd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs UPS tracking details.exe -
Executes dropped EXE 2 IoCs
pid Process 692 xciqtd.exe 5352 xciqtd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 492 set thread context of 1660 492 UPS tracking details.exe 95 PID 692 set thread context of 5352 692 xciqtd.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPS tracking details.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xciqtd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 492 UPS tracking details.exe 492 UPS tracking details.exe 492 UPS tracking details.exe 692 xciqtd.exe 692 xciqtd.exe 692 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe 5352 xciqtd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 492 UPS tracking details.exe Token: SeDebugPrivilege 492 UPS tracking details.exe Token: SeDebugPrivilege 1660 UPS tracking details.exe Token: SeDebugPrivilege 692 xciqtd.exe Token: SeDebugPrivilege 692 xciqtd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 492 wrote to memory of 1660 492 UPS tracking details.exe 95 PID 1660 wrote to memory of 692 1660 UPS tracking details.exe 106 PID 1660 wrote to memory of 692 1660 UPS tracking details.exe 106 PID 1660 wrote to memory of 692 1660 UPS tracking details.exe 106 PID 692 wrote to memory of 5352 692 xciqtd.exe 107 PID 692 wrote to memory of 5352 692 xciqtd.exe 107 PID 692 wrote to memory of 5352 692 xciqtd.exe 107 PID 692 wrote to memory of 5352 692 xciqtd.exe 107 PID 692 wrote to memory of 5352 692 xciqtd.exe 107 PID 692 wrote to memory of 5352 692 xciqtd.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:492
-
-
C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"C:\Users\Admin\AppData\Local\Temp\UPS tracking details.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\xciqtd.exe"C:\Users\Admin\AppData\Local\Temp\xciqtd.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692
-
-
-
C:\Users\Admin\AppData\Local\Temp\xciqtd.exe"C:\Users\Admin\AppData\Local\Temp\xciqtd.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5c0a50e2d3eeaea373b5a9f5b029b7487
SHA1118a21295bfa0e6f6aad3ef8dffed967028872c8
SHA2565ed36ab3f8243cc7adcbae0f26759e1877643b553e744f800e3dc3561a315586
SHA51235e14aa13c2f01bf85f756ca81b5f6de7f3665830ad919772efd6128a082d476c8cfe5a7b8d659d10aaae7fba7a704e99ec3059c8c477a2970f68cc241f765f2
-
Filesize
84B
MD5653f5c1d2324fc1b05ef57c9cbb50aef
SHA1211d276ced44ccb913c6dc3b0c105ec9ba05a1ba
SHA2566d5c05293e79f123a27b49d29ecba56c92906d7011659d088e52fe4267cb434b
SHA5127da31cc32d8b45c18819c1c13166a22c4909ff602ff7ae1658b295360d823dc6b2ef6a00f5fda5b21e037dfff7627dce8126eb6c366ac443755fa63f9407bee7
-
Filesize
851KB
MD56164d0754f346ce79cc3aded624b574f
SHA1eeee2ab483fc7d301b4936891c4160e1c38609dc
SHA25621510f702e7c54434cd5d11912029c579721d8a59cde4f229f3472a98dfb0a69
SHA512c38147be7159e86a7470147659b5bea6be8db33a7bdb823ffa1ce358a0ef64543a7ae5297c09c057d40588184f5da9f5e29d83e7ea446877130e06f992324056