Analysis
-
max time kernel
268s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
LOLSA.exe
Resource
win7-20240903-en
General
-
Target
LOLSA.exe
-
Size
76KB
-
MD5
621dcab53a15d786df2dfeb98a8adfb1
-
SHA1
b12ee4ca64b434cc1ab4d69aab3e4775701bfbec
-
SHA256
01e7b0486debabca8a91c3e3fc9681029abac9c5fdee43dc100bf3a63dd787b3
-
SHA512
87861a052238be7ef723ca4b3467a4fb761001756a8449137ca71c50098a3ea00583876021693a325c3f72d83d0aa4a2f584367856ff9ba439679ef068ab091d
-
SSDEEP
1536:OEO2Gh2SX1ntBuH10rogO2Gh2SX1ptBuH10g2r4n:Otvh2SX5tBCXRvh2SXPtBCwy
Malware Config
Extracted
xworm
5.0
10.0.0.2:9999
10.0.0.2:12973
vRSzIIih44311wot
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023c23-6.dat family_xworm behavioral2/files/0x0009000000023d12-22.dat family_xworm behavioral2/memory/3332-25-0x0000000000590000-0x000000000059E000-memory.dmp family_xworm behavioral2/memory/2304-26-0x0000000000210000-0x000000000021E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation LOLSA.exe -
Executes dropped EXE 2 IoCs
pid Process 2304 XClie1nt.exe 3332 XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3332 XClient.exe Token: SeDebugPrivilege 2304 XClie1nt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2304 4576 LOLSA.exe 84 PID 4576 wrote to memory of 2304 4576 LOLSA.exe 84 PID 4576 wrote to memory of 3332 4576 LOLSA.exe 85 PID 4576 wrote to memory of 3332 4576 LOLSA.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOLSA.exe"C:\Users\Admin\AppData\Local\Temp\LOLSA.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Roaming\XClie1nt.exe"C:\Users\Admin\AppData\Roaming\XClie1nt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53dbd0527815ab24d296b233d8be1b149
SHA10b13b56571af9cab67a327e2cda41fbafd739436
SHA256358ab451763002ab0ce80b3de9e86471fe4ff7b50537003ad8e097ed45fa68db
SHA51298bfe54c9bd74073b9b6ce603771d534b51ca4dc74fbf220d34589dc87917382d317c6e5aae6e0e1546ad1f3244c24b3d750e4901fce436861215f1865fdac0d
-
Filesize
33KB
MD5b92bd4ef0d62c07cf2ec33f65e97dcd9
SHA14d8c7ab061eee4a8f50e25bed0c3ec1a64540d60
SHA2569cddec2b93b417e0713aaa0fca2f6e4c7fd7732f4e3d3cda8b2903100702fa60
SHA512dbb780cb0aa31a92e201d59091ef8ff7667f85dcd69562ded07c16f7ea2c0caab174b4b1a5338de4d81e93b9bf5b37907e0a52547bc5f7c19700146ea6461233