Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/03/2025, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
2.9MB
-
MD5
a6e5c269f23e7de3907676c9b4220e36
-
SHA1
4fec20effa5aa204a6fb5d6ec6da9efee2b23162
-
SHA256
7221fe6503a6c7a114a70601e6211093698d74c5286f8ff17822df52b510cfd5
-
SHA512
9d56b1ce265c47206b650e212f61050f653290a773ab266d774c37e61579015b3e1cc876c240dc31d8878365a1373da7e9df683217323bd63f1ccf2edb636b00
-
SSDEEP
49152:QLEu3S+KvEhtxXrdoQ9/SSA6d/MxC6U+3SVTlIJMuy4V5jDFQPKW9OTk8o:qjS+KvEFmASRuf6L3aqvFM9O5o
Malware Config
Extracted
xworm
5.0
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
iq4Cbvqxc9yxmDW5
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000027df9-35.dat family_xworm behavioral1/memory/4676-49-0x00000000002D0000-0x00000000002E2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2440 powershell.exe 3288 powershell.exe 728 powershell.exe 4892 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation Bootstrappe.exe Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation X.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk X.exe -
Executes dropped EXE 6 IoCs
pid Process 4648 Bootstrappe.exe 1448 SolaraNew.exe 4676 X.exe 4948 svchost.exe 1324 svchost.exe 1664 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" X.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2440 powershell.exe 2440 powershell.exe 3288 powershell.exe 3288 powershell.exe 728 powershell.exe 728 powershell.exe 4892 powershell.exe 4892 powershell.exe 4676 X.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4676 X.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeIncreaseQuotaPrivilege 2440 powershell.exe Token: SeSecurityPrivilege 2440 powershell.exe Token: SeTakeOwnershipPrivilege 2440 powershell.exe Token: SeLoadDriverPrivilege 2440 powershell.exe Token: SeSystemProfilePrivilege 2440 powershell.exe Token: SeSystemtimePrivilege 2440 powershell.exe Token: SeProfSingleProcessPrivilege 2440 powershell.exe Token: SeIncBasePriorityPrivilege 2440 powershell.exe Token: SeCreatePagefilePrivilege 2440 powershell.exe Token: SeBackupPrivilege 2440 powershell.exe Token: SeRestorePrivilege 2440 powershell.exe Token: SeShutdownPrivilege 2440 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeSystemEnvironmentPrivilege 2440 powershell.exe Token: SeRemoteShutdownPrivilege 2440 powershell.exe Token: SeUndockPrivilege 2440 powershell.exe Token: SeManageVolumePrivilege 2440 powershell.exe Token: 33 2440 powershell.exe Token: 34 2440 powershell.exe Token: 35 2440 powershell.exe Token: 36 2440 powershell.exe Token: SeDebugPrivilege 3288 powershell.exe Token: SeIncreaseQuotaPrivilege 3288 powershell.exe Token: SeSecurityPrivilege 3288 powershell.exe Token: SeTakeOwnershipPrivilege 3288 powershell.exe Token: SeLoadDriverPrivilege 3288 powershell.exe Token: SeSystemProfilePrivilege 3288 powershell.exe Token: SeSystemtimePrivilege 3288 powershell.exe Token: SeProfSingleProcessPrivilege 3288 powershell.exe Token: SeIncBasePriorityPrivilege 3288 powershell.exe Token: SeCreatePagefilePrivilege 3288 powershell.exe Token: SeBackupPrivilege 3288 powershell.exe Token: SeRestorePrivilege 3288 powershell.exe Token: SeShutdownPrivilege 3288 powershell.exe Token: SeDebugPrivilege 3288 powershell.exe Token: SeSystemEnvironmentPrivilege 3288 powershell.exe Token: SeRemoteShutdownPrivilege 3288 powershell.exe Token: SeUndockPrivilege 3288 powershell.exe Token: SeManageVolumePrivilege 3288 powershell.exe Token: 33 3288 powershell.exe Token: 34 3288 powershell.exe Token: 35 3288 powershell.exe Token: 36 3288 powershell.exe Token: SeDebugPrivilege 728 powershell.exe Token: SeIncreaseQuotaPrivilege 728 powershell.exe Token: SeSecurityPrivilege 728 powershell.exe Token: SeTakeOwnershipPrivilege 728 powershell.exe Token: SeLoadDriverPrivilege 728 powershell.exe Token: SeSystemProfilePrivilege 728 powershell.exe Token: SeSystemtimePrivilege 728 powershell.exe Token: SeProfSingleProcessPrivilege 728 powershell.exe Token: SeIncBasePriorityPrivilege 728 powershell.exe Token: SeCreatePagefilePrivilege 728 powershell.exe Token: SeBackupPrivilege 728 powershell.exe Token: SeRestorePrivilege 728 powershell.exe Token: SeShutdownPrivilege 728 powershell.exe Token: SeDebugPrivilege 728 powershell.exe Token: SeSystemEnvironmentPrivilege 728 powershell.exe Token: SeRemoteShutdownPrivilege 728 powershell.exe Token: SeUndockPrivilege 728 powershell.exe Token: SeManageVolumePrivilege 728 powershell.exe Token: 33 728 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4676 X.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4648 5020 BootstrapperNew.exe 80 PID 5020 wrote to memory of 4648 5020 BootstrapperNew.exe 80 PID 4648 wrote to memory of 1448 4648 Bootstrappe.exe 82 PID 4648 wrote to memory of 1448 4648 Bootstrappe.exe 82 PID 4648 wrote to memory of 4676 4648 Bootstrappe.exe 83 PID 4648 wrote to memory of 4676 4648 Bootstrappe.exe 83 PID 4676 wrote to memory of 2440 4676 X.exe 86 PID 4676 wrote to memory of 2440 4676 X.exe 86 PID 4676 wrote to memory of 3288 4676 X.exe 91 PID 4676 wrote to memory of 3288 4676 X.exe 91 PID 4676 wrote to memory of 728 4676 X.exe 93 PID 4676 wrote to memory of 728 4676 X.exe 93 PID 4676 wrote to memory of 4892 4676 X.exe 95 PID 4676 wrote to memory of 4892 4676 X.exe 95 PID 4676 wrote to memory of 4976 4676 X.exe 98 PID 4676 wrote to memory of 4976 4676 X.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Bootstrappe.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrappe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"3⤵
- Executes dropped EXE
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4976
-
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:4948
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:1324
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:1664
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5020d1cbef5aeb22088c0faff8d76af4e
SHA193e7f27b8fb57cfea4ae330bedcace1a8ce7c014
SHA256cb283829df7f7ca2f7f8072ed014bebb7d424581e8672a9fa5683f3674726bb0
SHA5121046228ed9d08e5296c02409b5aa460e8280a633f7f2022ec7dc7c1e750522260006844bd5114ec713593bce1d10b8932963a8630e6707e76b45a0cb8c8ff53d
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
1KB
MD529d056d9bc9b4ec73b3c65ff2ab3de06
SHA1dc003908eba5553852886f062ad1c37072e2ffe1
SHA25665290526acdf94c202c88fe590659e4358495e3ad18040f6a380aae80bec3044
SHA512f24d3803b7acbbc627655ce4ea0bf3f3f8a33ce094555688e0ff09192625c068af34cb5694dc00b7f0b9ec1d00dcc060c2df03f967bc5cdb7e3b53c69c7ef326
-
Filesize
1KB
MD50d9ee3fed6743bc341bbb3683125d066
SHA1e39707e7ac64fddccad2c0a1c8fa88e5bfb50945
SHA256fe35f71394332712438c468ca4032079fdfd19858ddf3e6b2450583ffc46741b
SHA512bbb1d9c36130b60975e167cba532861a517d78c51223e535badb7a017c7af362fa94f9a77a0619363998f86d15f74ed5c9615552d3bc0746406df8db2762b10b
-
Filesize
1KB
MD5e4115b6aec6e8175d5ba82ea5d6814e4
SHA1c5f4b102a89d96e4e3d42184d14faf2d5ea25791
SHA2566c040aa37326b1490a81680367d627442685327f974e34afb08ca45ca0681276
SHA5121883d7153e86c5a9df2d5bcd579034208225706f40f544ffb7692cb3fa625cfea992105e551486ce23a12ee905c60b133783324d3604563da7371cd54c9a598e
-
Filesize
2.9MB
MD5131133cc49e50582830a994f8f5b4801
SHA16a462b92271e41bd2eb429a43d130ee5e16611c3
SHA256e4cbecaaff0904bcd1ffd4d95287d5a5e952af98597781aab9a9cb8cd9f8d915
SHA5120c59301cf9f328395cd421d54b6becf9e4aefe40248ebbaee69ba557ca8108b65c0e30bec6a30c412646dc8de5b8c86b35093b952a7cfa378caf74a276ccf459
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
44KB
MD5d8dec448ddbb0749bbe3f4259c9bc29b
SHA193886a2b1c55fa6ff41ac5bce6945e601d355f8c
SHA25656ef629323495497970ffe5efd4c3197bd8043825ba264b9e6294113675820ac
SHA51220739296d87d15b801086a8e7478875722e83dc1fd4004e9905a1c6f8c0c8913644bcf7e5b7aecb760f4870354118fc10d218f952fcd7b204c1f0ebae4e4a400
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82