Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/03/2025, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
Xy.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
Xy.exe
-
Size
279KB
-
MD5
26b8c8447ad993bac09e6f270c971350
-
SHA1
79eb2edfb98048ff5a1c299bd3a6791fd50f5c28
-
SHA256
fd9e202bbc06743763e464da73aad4904e2f4840ce1ec716ebd65df8145807b9
-
SHA512
1b67eaa1efda4a9149a29047e8a996e13d10e1d6e73f6d496075733b647a36718ac14fc0fa3de22eb1b2e66093470df18f9fae81a1f48427550633b93082834b
-
SSDEEP
6144:5s8L+T9Gs8uhFJuri3S6leB4eYdEQXj3PFCITdBh5SU8S9S6VeDk9:5s8aGpIMiP3SkjfFCABhoDS9S6VeDk9
Malware Config
Extracted
xworm
5.0
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
iq4Cbvqxc9yxmDW5
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000027df1-32.dat family_xworm behavioral1/memory/3864-43-0x0000000000BE0000-0x0000000000BF2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4528 powershell.exe 1424 powershell.exe 2180 powershell.exe 3812 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation Output6.exe Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation X.exe Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation Xy.exe Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation Output6.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk X.exe -
Executes dropped EXE 7 IoCs
pid Process 1320 XYZ.exe 1152 Output6.exe 3864 X.exe 4212 Output6.exe 4324 X.exe 3884 svchost.exe 2264 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" XYZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" X.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4528 powershell.exe 4528 powershell.exe 1424 powershell.exe 1424 powershell.exe 2180 powershell.exe 2180 powershell.exe 3812 powershell.exe 3812 powershell.exe 3864 X.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3864 X.exe Token: SeDebugPrivilege 4324 X.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeIncreaseQuotaPrivilege 4528 powershell.exe Token: SeSecurityPrivilege 4528 powershell.exe Token: SeTakeOwnershipPrivilege 4528 powershell.exe Token: SeLoadDriverPrivilege 4528 powershell.exe Token: SeSystemProfilePrivilege 4528 powershell.exe Token: SeSystemtimePrivilege 4528 powershell.exe Token: SeProfSingleProcessPrivilege 4528 powershell.exe Token: SeIncBasePriorityPrivilege 4528 powershell.exe Token: SeCreatePagefilePrivilege 4528 powershell.exe Token: SeBackupPrivilege 4528 powershell.exe Token: SeRestorePrivilege 4528 powershell.exe Token: SeShutdownPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeSystemEnvironmentPrivilege 4528 powershell.exe Token: SeRemoteShutdownPrivilege 4528 powershell.exe Token: SeUndockPrivilege 4528 powershell.exe Token: SeManageVolumePrivilege 4528 powershell.exe Token: 33 4528 powershell.exe Token: 34 4528 powershell.exe Token: 35 4528 powershell.exe Token: 36 4528 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeIncreaseQuotaPrivilege 1424 powershell.exe Token: SeSecurityPrivilege 1424 powershell.exe Token: SeTakeOwnershipPrivilege 1424 powershell.exe Token: SeLoadDriverPrivilege 1424 powershell.exe Token: SeSystemProfilePrivilege 1424 powershell.exe Token: SeSystemtimePrivilege 1424 powershell.exe Token: SeProfSingleProcessPrivilege 1424 powershell.exe Token: SeIncBasePriorityPrivilege 1424 powershell.exe Token: SeCreatePagefilePrivilege 1424 powershell.exe Token: SeBackupPrivilege 1424 powershell.exe Token: SeRestorePrivilege 1424 powershell.exe Token: SeShutdownPrivilege 1424 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeSystemEnvironmentPrivilege 1424 powershell.exe Token: SeRemoteShutdownPrivilege 1424 powershell.exe Token: SeUndockPrivilege 1424 powershell.exe Token: SeManageVolumePrivilege 1424 powershell.exe Token: 33 1424 powershell.exe Token: 34 1424 powershell.exe Token: 35 1424 powershell.exe Token: 36 1424 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeIncreaseQuotaPrivilege 2180 powershell.exe Token: SeSecurityPrivilege 2180 powershell.exe Token: SeTakeOwnershipPrivilege 2180 powershell.exe Token: SeLoadDriverPrivilege 2180 powershell.exe Token: SeSystemProfilePrivilege 2180 powershell.exe Token: SeSystemtimePrivilege 2180 powershell.exe Token: SeProfSingleProcessPrivilege 2180 powershell.exe Token: SeIncBasePriorityPrivilege 2180 powershell.exe Token: SeCreatePagefilePrivilege 2180 powershell.exe Token: SeBackupPrivilege 2180 powershell.exe Token: SeRestorePrivilege 2180 powershell.exe Token: SeShutdownPrivilege 2180 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeSystemEnvironmentPrivilege 2180 powershell.exe Token: SeRemoteShutdownPrivilege 2180 powershell.exe Token: SeUndockPrivilege 2180 powershell.exe Token: SeManageVolumePrivilege 2180 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3864 X.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1320 4464 Xy.exe 84 PID 4464 wrote to memory of 1320 4464 Xy.exe 84 PID 1320 wrote to memory of 1152 1320 XYZ.exe 85 PID 1320 wrote to memory of 1152 1320 XYZ.exe 85 PID 1152 wrote to memory of 3864 1152 Output6.exe 86 PID 1152 wrote to memory of 3864 1152 Output6.exe 86 PID 1320 wrote to memory of 4212 1320 XYZ.exe 87 PID 1320 wrote to memory of 4212 1320 XYZ.exe 87 PID 4212 wrote to memory of 4324 4212 Output6.exe 88 PID 4212 wrote to memory of 4324 4212 Output6.exe 88 PID 3864 wrote to memory of 4528 3864 X.exe 89 PID 3864 wrote to memory of 4528 3864 X.exe 89 PID 3864 wrote to memory of 1424 3864 X.exe 94 PID 3864 wrote to memory of 1424 3864 X.exe 94 PID 3864 wrote to memory of 2180 3864 X.exe 97 PID 3864 wrote to memory of 2180 3864 X.exe 97 PID 3864 wrote to memory of 3812 3864 X.exe 100 PID 3864 wrote to memory of 3812 3864 X.exe 100 PID 3864 wrote to memory of 1512 3864 X.exe 102 PID 3864 wrote to memory of 1512 3864 X.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xy.exe"C:\Users\Admin\AppData\Local\Temp\Xy.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\XYZ.exe"C:\Users\Admin\AppData\Local\Temp\XYZ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Output6.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Output6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Output6.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Output6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:3884
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:2264
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD59243fa89b20a2aebc1867c651d286e8d
SHA195a5bdc1dd48f885120d67874b2cdcffdd01235b
SHA2564b9aa0aba5d440e056655fc8b4f3c2cbea38153eb87b16fbf6b1be791308349d
SHA512fc84b34ff9c5b0c272b24d568c569936be194a8498efcb55eba5ea8f518ed5ebc2b0480bd5df85424a2cf1b367f7d5cd576533688869fb83678fb29256098b23
-
Filesize
1KB
MD514ade977d5aee19d8d43a5545fb17aa4
SHA12f09f41411cd31ea761e878ef477a0a15f037823
SHA256313690a5bea10becc948a438d4197abe7d6116e1f36cc094bfe63ac4b76bc704
SHA512f7bf8a2e6a5fe5e4c60873e8e053227f7fdeb46a7336d95ae08b3aefa3e46c4310ac5185903f9854172604b1f1cdfffa7a9aeeea11464adebe6d999f46f999c9
-
Filesize
63KB
MD5cd2ddcd6277870bf932c2ce7ceb6a751
SHA16b59512eeb05ca9ed7678dd22c3cf7bc5de73081
SHA256a7054a1884840849875f337bda0597c9202b48a21fa3a5dd9b2aa10ff7f5c7c0
SHA51241aed4d60838e507c58ecd83ff4e125381b0aac473bfb05f81562be83dcad051a3ba7cb2db90b2a29d72fa826dd3f734cbb7feb230969d1436d4cc19816a2c98
-
Filesize
44KB
MD5d8dec448ddbb0749bbe3f4259c9bc29b
SHA193886a2b1c55fa6ff41ac5bce6945e601d355f8c
SHA25656ef629323495497970ffe5efd4c3197bd8043825ba264b9e6294113675820ac
SHA51220739296d87d15b801086a8e7478875722e83dc1fd4004e9905a1c6f8c0c8913644bcf7e5b7aecb760f4870354118fc10d218f952fcd7b204c1f0ebae4e4a400
-
Filesize
216KB
MD51e50acd16fd12d227a15e0a39d99ed93
SHA19814bab112a7d370d282d2a22e9867f938db37ca
SHA256c4527dff7cfbd4b73509c0617dc8573a2d410298eadfdf5d4913a8b24aa290e8
SHA5127454f284b93c779c9bc6b9a1454abf444a789ba5a6737eb15494b369ca69beca4197f5984672b07721210ed6e864fd31ce48ae4ea215b4cb69189918c3acaad9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82