Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
pictures and specifications.exe
Resource
win7-20240903-en
General
-
Target
pictures and specifications.exe
-
Size
177KB
-
MD5
ce901f91244366477cd0b769d92f9034
-
SHA1
6f49860e768725f78bf3855d18efe329b3553355
-
SHA256
1b72e6203b4d26cbe44b55e7df27b3477badd3270cf900bb13c2af47bed80516
-
SHA512
2f94fbd0d733db31c5ad56be18ee53ec6a531a7d7f5bc08f59c1c7f3dd0f5827b9e4dd586b084ac031fd06599510332d21ebbb7515a1441332d1fc11b143bdfb
-
SSDEEP
3072:5rsawEN2scoJ7FWN3WfHC5kan0r0i4tyAyptWKye6vx2PvLn3:5H7FLf4kan0rBP
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4828-1348-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2872 created 3420 2872 pictures and specifications.exe 56 PID 2772 created 3420 2772 phpncg.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation pictures and specifications.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs pictures and specifications.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs phpncg.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 phpncg.exe 3664 phpncg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2872 set thread context of 4828 2872 pictures and specifications.exe 97 PID 2772 set thread context of 3664 2772 phpncg.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and specifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phpncg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and specifications.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2872 pictures and specifications.exe 2872 pictures and specifications.exe 2872 pictures and specifications.exe 2772 phpncg.exe 2772 phpncg.exe 2772 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe 3664 phpncg.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2872 pictures and specifications.exe Token: SeDebugPrivilege 2872 pictures and specifications.exe Token: SeDebugPrivilege 4828 pictures and specifications.exe Token: SeDebugPrivilege 2772 phpncg.exe Token: SeDebugPrivilege 2772 phpncg.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 2872 wrote to memory of 4828 2872 pictures and specifications.exe 97 PID 4828 wrote to memory of 2772 4828 pictures and specifications.exe 106 PID 4828 wrote to memory of 2772 4828 pictures and specifications.exe 106 PID 4828 wrote to memory of 2772 4828 pictures and specifications.exe 106 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107 PID 2772 wrote to memory of 3664 2772 phpncg.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\phpncg.exe"C:\Users\Admin\AppData\Local\Temp\phpncg.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\phpncg.exe"C:\Users\Admin\AppData\Local\Temp\phpncg.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD52a92df410ae147573fb1ffa5e1431251
SHA12d49c7eb4fb33484a320c2b8ce63cebc3e8222b1
SHA256f39606c32ff9914d13d32a9b69b2142a09491f9e421e1d53cddb7d1f82fef4e3
SHA5125abb6222118a9611955b365dfa722f1156713db8d344cf47dfffbf4a66eac7e83fbcb9548970185dfaece8c22f3b3833c5369a755845b6ad3bf7ee7aaf1c6d17
-
Filesize
86B
MD56c762d94ee2fdac893f6223f532d73d5
SHA18f7aa36c5215433d12e9bab97a393f7767b9258e
SHA256bc13fe6ffecd43e59d593e6e33adf9a2d32fb667c19c7c9680a8b7e6ec3fec3a
SHA512679f857976501def1222e3ff9dce3f52054d7f6368562802919401e8bd23ebe35a96b17949c7f788a75d285356b7770363ef20ddbd62baa6015ea09647269f8c
-
Filesize
128KB
MD5c278371f813a64c690cd277c663a6f1d
SHA1cfdd2eccffbb24468cea2a60a80608e9136ba68d
SHA2565a829a83f4743fc835b06ccf02c166be0a9f8c651018919cf838290b1ac469bc
SHA512ab43d1b3d8d314092b4ad7022dfc6d3288032c72df854c36daeb26d4eea7143865579df7ed34f1be5db175ab547d667bb7b5f75262af7c7e44dd067874bff985