Analysis
-
max time kernel
149s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe
Resource
win7-20240903-en
General
-
Target
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe
-
Size
1.7MB
-
MD5
a378359637b5d95388debc25f568ce9f
-
SHA1
1d88e287db2b9bb659688d8b79e418d7504c3145
-
SHA256
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
SHA512
b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1
-
SSDEEP
49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW
Malware Config
Extracted
xworm
set-reduces.gl.at.ply.gg:28950
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/3636-22-0x0000000000270000-0x00000000005F2000-memory.dmp family_xworm behavioral2/memory/3636-26-0x0000000000270000-0x00000000005F2000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Bootstraper.exe -
Executes dropped EXE 2 IoCs
pid Process 3352 Bootstraper.exe 3636 BootstraperNew_protected.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3636 BootstraperNew_protected.exe 3636 BootstraperNew_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4772 3636 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstraperNew_protected.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3636 BootstraperNew_protected.exe 3636 BootstraperNew_protected.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3636 BootstraperNew_protected.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3636 BootstraperNew_protected.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1972 wrote to memory of 3352 1972 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe 88 PID 1972 wrote to memory of 3352 1972 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe 88 PID 3352 wrote to memory of 3636 3352 Bootstraper.exe 90 PID 3352 wrote to memory of 3636 3352 Bootstraper.exe 90 PID 3352 wrote to memory of 3636 3352 Bootstraper.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe"C:\Users\Admin\AppData\Local\Temp\ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Windows\System32\Bootstraper.exe"C:\Users\Admin\AppData\Local\Temp\Windows\System32\Bootstraper.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\BootstraperNew_protected.exe"C:\Users\Admin\AppData\Local\Temp\BootstraperNew_protected.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 18324⤵
- Program crash
PID:4772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3636 -ip 36361⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52a1de04ba5a824f8ac57894935bc6d27
SHA17cf6f2d735ba9f1a536fc8453f87e77d34c1a5be
SHA256ba3b1c382e24ebd6d37d2c7734720c6aa764f562a25d7dcbc7e3a1595afaa1d4
SHA5123c62fa6792b1480ac0f3c200628992425616873d70ffcf675952adb7e4d9f77d034087148d5e2cd45871ec12fb6825a751d70d2e58302ce4843ac9f0def24378
-
Filesize
1.5MB
MD53ae688a1356c87103f12f78f36d44c7d
SHA12e4d0a10a3b00f6effa14fba95a075bcaae217fb
SHA256b2249f5105cc208e95d559ef92783eb1dc824fb6fca9a3596e6a0139161af502
SHA51229e6790c775dfbf31fd9b347b70dad61a2693bfbfa9fda75cb71922e9fd8900f451deb3fb02241b2992c93b24f1d10eb65fdd7e4f6a49948f35cc349ca269fb1