Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 01:35
Static task
static1
General
-
Target
BootstrapperNe.exe
-
Size
3.0MB
-
MD5
2db7ca48c2862fe3c8ffefb50b7f975b
-
SHA1
09e61b2d5d3876fc0c8030e075745f89289fb876
-
SHA256
ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf
-
SHA512
d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa
-
SSDEEP
49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+
Malware Config
Extracted
xworm
127.0.0.1:5467
google-rocks.gl.at.ply.gg:5467
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023d0b-17.dat family_xworm behavioral1/memory/3716-28-0x0000000000AE0000-0x0000000000AFA000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation BootstrapperNe.exe -
Executes dropped EXE 2 IoCs
pid Process 464 BootstrapperNew.exe 3716 XSolara.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3716 XSolara.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 464 3020 BootstrapperNe.exe 86 PID 3020 wrote to memory of 464 3020 BootstrapperNe.exe 86 PID 3020 wrote to memory of 3716 3020 BootstrapperNe.exe 87 PID 3020 wrote to memory of 3716 3020 BootstrapperNe.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"2⤵
- Executes dropped EXE
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\XSolara.exe"C:\Users\Admin\AppData\Local\Temp\XSolara.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
87KB
MD5bd130ce57bdd005741ea1de2c87dcb6a
SHA1bcfcebf6357ba5714d5373b09d84b4b354efb10e
SHA256ccb4e8281d4e04b75ffb4c7e7bbc5c8073d7f6f027814ebbf2e63e702ae57b4a
SHA5121ed20f9192901250646f2bb1fab493d6bb01eff344b86ea5f0f5955de7233180ff4386ad3939f50dc3d47ce2facb1422f29d80f6d0672d8a106084fc474e56a3