Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 01:35

General

  • Target

    BootstrapperNe.exe

  • Size

    3.0MB

  • MD5

    2db7ca48c2862fe3c8ffefb50b7f975b

  • SHA1

    09e61b2d5d3876fc0c8030e075745f89289fb876

  • SHA256

    ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf

  • SHA512

    d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa

  • SSDEEP

    49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5467

google-rocks.gl.at.ply.gg:5467

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
      2⤵
      • Executes dropped EXE
      PID:464
    • C:\Users\Admin\AppData\Local\Temp\XSolara.exe
      "C:\Users\Admin\AppData\Local\Temp\XSolara.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe

    Filesize

    2.9MB

    MD5

    f227cdfd423b3cc03bb69c49babf4da3

    SHA1

    3db5a97d9b0f2545e7ba97026af6c28512200441

    SHA256

    cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

    SHA512

    b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

  • C:\Users\Admin\AppData\Local\Temp\XSolara.exe

    Filesize

    87KB

    MD5

    bd130ce57bdd005741ea1de2c87dcb6a

    SHA1

    bcfcebf6357ba5714d5373b09d84b4b354efb10e

    SHA256

    ccb4e8281d4e04b75ffb4c7e7bbc5c8073d7f6f027814ebbf2e63e702ae57b4a

    SHA512

    1ed20f9192901250646f2bb1fab493d6bb01eff344b86ea5f0f5955de7233180ff4386ad3939f50dc3d47ce2facb1422f29d80f6d0672d8a106084fc474e56a3

  • memory/464-33-0x00000150235A0000-0x00000150235AE000-memory.dmp

    Filesize

    56KB

  • memory/464-31-0x0000015023180000-0x0000015023188000-memory.dmp

    Filesize

    32KB

  • memory/464-25-0x00000150034A0000-0x0000015003782000-memory.dmp

    Filesize

    2.9MB

  • memory/464-46-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/464-27-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/464-45-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/464-29-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/464-35-0x00000150235B0000-0x00000150235BA000-memory.dmp

    Filesize

    40KB

  • memory/464-34-0x0000015024490000-0x0000015024590000-memory.dmp

    Filesize

    1024KB

  • memory/464-32-0x00000150235D0000-0x0000015023608000-memory.dmp

    Filesize

    224KB

  • memory/464-41-0x0000015024590000-0x0000015024598000-memory.dmp

    Filesize

    32KB

  • memory/464-40-0x00000150235C0000-0x00000150235CA000-memory.dmp

    Filesize

    40KB

  • memory/464-30-0x0000015005310000-0x0000015005320000-memory.dmp

    Filesize

    64KB

  • memory/464-37-0x0000015023650000-0x0000015023658000-memory.dmp

    Filesize

    32KB

  • memory/464-36-0x0000015023610000-0x0000015023636000-memory.dmp

    Filesize

    152KB

  • memory/464-39-0x0000015023640000-0x000001502364A000-memory.dmp

    Filesize

    40KB

  • memory/464-38-0x0000015023660000-0x0000015023676000-memory.dmp

    Filesize

    88KB

  • memory/3020-0-0x00007FFD729D3000-0x00007FFD729D5000-memory.dmp

    Filesize

    8KB

  • memory/3020-1-0x0000000000730000-0x0000000000A2E000-memory.dmp

    Filesize

    3.0MB

  • memory/3716-43-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/3716-44-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB

  • memory/3716-28-0x0000000000AE0000-0x0000000000AFA000-memory.dmp

    Filesize

    104KB

  • memory/3716-26-0x00007FFD729D0000-0x00007FFD73491000-memory.dmp

    Filesize

    10.8MB