Analysis
-
max time kernel
101s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
picturesandspecifications.exe
Resource
win7-20240903-en
General
-
Target
picturesandspecifications.exe
-
Size
177KB
-
MD5
ce901f91244366477cd0b769d92f9034
-
SHA1
6f49860e768725f78bf3855d18efe329b3553355
-
SHA256
1b72e6203b4d26cbe44b55e7df27b3477badd3270cf900bb13c2af47bed80516
-
SHA512
2f94fbd0d733db31c5ad56be18ee53ec6a531a7d7f5bc08f59c1c7f3dd0f5827b9e4dd586b084ac031fd06599510332d21ebbb7515a1441332d1fc11b143bdfb
-
SSDEEP
3072:5rsawEN2scoJ7FWN3WfHC5kan0r0i4tyAyptWKye6vx2PvLn3:5H7FLf4kan0rBP
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4176-1347-0x00000000005F0000-0x00000000005FE000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2172 created 3452 2172 picturesandspecifications.exe 56 PID 4100 created 3452 4100 ybbcdf.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation picturesandspecifications.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs picturesandspecifications.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs ybbcdf.exe -
Executes dropped EXE 2 IoCs
pid Process 4100 ybbcdf.exe 5868 ybbcdf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2172 set thread context of 4176 2172 picturesandspecifications.exe 98 PID 4100 set thread context of 5868 4100 ybbcdf.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language picturesandspecifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language picturesandspecifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ybbcdf.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2172 picturesandspecifications.exe 2172 picturesandspecifications.exe 2172 picturesandspecifications.exe 4100 ybbcdf.exe 4100 ybbcdf.exe 4100 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe 5868 ybbcdf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2172 picturesandspecifications.exe Token: SeDebugPrivilege 2172 picturesandspecifications.exe Token: SeDebugPrivilege 4176 picturesandspecifications.exe Token: SeDebugPrivilege 4100 ybbcdf.exe Token: SeDebugPrivilege 4100 ybbcdf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 2172 wrote to memory of 4176 2172 picturesandspecifications.exe 98 PID 4176 wrote to memory of 4100 4176 picturesandspecifications.exe 108 PID 4176 wrote to memory of 4100 4176 picturesandspecifications.exe 108 PID 4176 wrote to memory of 4100 4176 picturesandspecifications.exe 108 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109 PID 4100 wrote to memory of 5868 4100 ybbcdf.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\picturesandspecifications.exe"C:\Users\Admin\AppData\Local\Temp\picturesandspecifications.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\picturesandspecifications.exe"C:\Users\Admin\AppData\Local\Temp\picturesandspecifications.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\ybbcdf.exe"C:\Users\Admin\AppData\Local\Temp\ybbcdf.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\ybbcdf.exe"C:\Users\Admin\AppData\Local\Temp\ybbcdf.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD52a92df410ae147573fb1ffa5e1431251
SHA12d49c7eb4fb33484a320c2b8ce63cebc3e8222b1
SHA256f39606c32ff9914d13d32a9b69b2142a09491f9e421e1d53cddb7d1f82fef4e3
SHA5125abb6222118a9611955b365dfa722f1156713db8d344cf47dfffbf4a66eac7e83fbcb9548970185dfaece8c22f3b3833c5369a755845b6ad3bf7ee7aaf1c6d17
-
Filesize
86B
MD56c762d94ee2fdac893f6223f532d73d5
SHA18f7aa36c5215433d12e9bab97a393f7767b9258e
SHA256bc13fe6ffecd43e59d593e6e33adf9a2d32fb667c19c7c9680a8b7e6ec3fec3a
SHA512679f857976501def1222e3ff9dce3f52054d7f6368562802919401e8bd23ebe35a96b17949c7f788a75d285356b7770363ef20ddbd62baa6015ea09647269f8c