Analysis
-
max time kernel
117s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
MicrosoftEdge.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MicrosoftEdge.exe
Resource
win10v2004-20250217-en
General
-
Target
MicrosoftEdge.exe
-
Size
3.3MB
-
MD5
a06a19515b00d599ecbf2c6d7a2a185a
-
SHA1
79c2ebaa97f6a46f6b10929d6c268541a9580aff
-
SHA256
ff853e1b05a5ce860ea3cc1f6beac04ac7721ca15f30795957fb35333623c76f
-
SHA512
f1fdba22e8f065e57fcfd468fe1e8afb40bf7e279919084ac32e1f085ef9b3d033e1462fa4295430bee063e9f0d7510899766f23abe3b4cb9121706bd4c9c2c4
-
SSDEEP
98304:xx6lXt2M6z/UsjaVs9jZ0WgH8zcinUP2yWkIy8vE:xx6dn6znXjCW1AiUeoaM
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
Microsoft Edge.exe
-
pastebin_url
https://pastebin.com/raw/zYgpCQBC
-
telegram
https://api.telegram.org/bot7322335748:AAEr-qkbNoi4AH-VkGzWTsoAJ0Jx3HkKwbk/sendMessage?chat_id=7763830849
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000900000001227e-5.dat family_xworm behavioral1/memory/2772-7-0x0000000000920000-0x0000000000956000-memory.dmp family_xworm behavioral1/files/0x0009000000016cd8-18.dat family_xworm behavioral1/memory/2160-20-0x0000000000800000-0x0000000000818000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 4 IoCs
pid Process 2772 SvMicrosoft Edge.exe 2556 XMouseButtonControlSetup.2.20.5.exe 2160 1.exe 2808 XMouseButtonControlSetup.2.20.5.exe -
Loads dropped DLL 4 IoCs
pid Process 2808 XMouseButtonControlSetup.2.20.5.exe 2808 XMouseButtonControlSetup.2.20.5.exe 2808 XMouseButtonControlSetup.2.20.5.exe 2808 XMouseButtonControlSetup.2.20.5.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XMouseButtonControlSetup.2.20.5.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016d1c-25.dat nsis_installer_1 behavioral1/files/0x0007000000016d1c-25.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 XMouseButtonControlSetup.2.20.5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 SvMicrosoft Edge.exe Token: SeDebugPrivilege 2160 1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2772 1176 MicrosoftEdge.exe 29 PID 1176 wrote to memory of 2772 1176 MicrosoftEdge.exe 29 PID 1176 wrote to memory of 2772 1176 MicrosoftEdge.exe 29 PID 1176 wrote to memory of 2556 1176 MicrosoftEdge.exe 30 PID 1176 wrote to memory of 2556 1176 MicrosoftEdge.exe 30 PID 1176 wrote to memory of 2556 1176 MicrosoftEdge.exe 30 PID 2556 wrote to memory of 2160 2556 XMouseButtonControlSetup.2.20.5.exe 31 PID 2556 wrote to memory of 2160 2556 XMouseButtonControlSetup.2.20.5.exe 31 PID 2556 wrote to memory of 2160 2556 XMouseButtonControlSetup.2.20.5.exe 31 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32 PID 2556 wrote to memory of 2808 2556 XMouseButtonControlSetup.2.20.5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdge.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdge.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\SvMicrosoft Edge.exe"C:\Users\Admin\AppData\Roaming\SvMicrosoft Edge.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Roaming\XMouseButtonControlSetup.2.20.5.exe"C:\Users\Admin\AppData\Roaming\XMouseButtonControlSetup.2.20.5.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD586ca1f0b4ffa5c117debfd36930bd8ed
SHA1b60034026605cbb7bfa0d959a2490d5ee8afc07e
SHA2560269d49364112f21d4013cf1313b89d85f721497ebb00a74f94f70accefcf466
SHA512a59c702fe1dac077cb123287f1b8cfb20e14d49ed589ede8350c1643d2cb65d72df2a68c6e4d7bd5b8606a299018521c2c66b3f534280d7de7420cc58b1dca9d
-
Filesize
2.9MB
MD52e9725bc1d71ad1b8006dfc5a2510f88
SHA16e1f7d12881696944bf5e030a7d131b969de0c6c
SHA2562240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818
SHA51262bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39
-
Filesize
418B
MD501cabcfa181f8a4ebb76a5534837bed2
SHA144fce3c7a7c8ca803c70a91ec828fd4581b4985e
SHA256a6895673619d2cb9d702bbe45df24a601c39fdff6c081da4a6bb2e2bdfa90ef7
SHA512c3667ca32c1ce53230a90488334472d745b8b78154cd861ba5edb2d636f1ba36f0f402597ae0b0e4d30152b6521d770dfd362e190f2628199da8079a0ac101a9
-
Filesize
726B
MD5fc2e7e9a5f42b094ed2f79985700c80d
SHA1958eb13269e9cde12bdc7b210121743261a00b4c
SHA2566c3602b0b43a775c0f3c98a88f7f33a2783b99b8af696ab09cf59b9892fbc262
SHA5120337a15e419e558f9f196b354b76fb85ae8c67ef0e3eccb434db1320a254a304e1d6ac5981d0e6361794cc9d39b77050e5b02b6b330e794e6ebd7a0e13e055da
-
Filesize
196KB
MD53704b4108c5fc22934f53039170e80b1
SHA13e7c89c12ce94732bd98faf4f213519679c5a258
SHA25658e1887c60d92b26ff6949984a37a5afcd79d72a2ca67091725b84c6a361298a
SHA512a34d62a8c1c2a06a3826f5e9c9d685fd104887a4dd5c8daf47372d8c95fb8c89d02682b63eb0c8883df56303b3a135d11ebd4601f5b9198587fb602cba27f63d
-
Filesize
3.0MB
MD5ed193fb6b7c818e0cb4f23b28063afa4
SHA12dd264437554fb82fb2da776bab1b213795a4480
SHA2560c5c102b1ac5d2a8be80d3fbceaab8392e544c9be9622443fbd4c5f710e3e005
SHA512bc35b1805336406c2ebe5365bf5af83223f6412f3cc98cf20b38cfc5a7b34f5c685fc33a39dc8e9780c9f6d7db58a8b345b975be8c1ee35dec6ff1d4edc4242f
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
9KB
MD5f832e4279c8ff9029b94027803e10e1b
SHA1134ff09f9c70999da35e73f57b70522dc817e681
SHA2564cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061
SHA512bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d