Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
pictures and specifications.exe
Resource
win7-20240903-en
General
-
Target
pictures and specifications.exe
-
Size
177KB
-
MD5
ce901f91244366477cd0b769d92f9034
-
SHA1
6f49860e768725f78bf3855d18efe329b3553355
-
SHA256
1b72e6203b4d26cbe44b55e7df27b3477badd3270cf900bb13c2af47bed80516
-
SHA512
2f94fbd0d733db31c5ad56be18ee53ec6a531a7d7f5bc08f59c1c7f3dd0f5827b9e4dd586b084ac031fd06599510332d21ebbb7515a1441332d1fc11b143bdfb
-
SSDEEP
3072:5rsawEN2scoJ7FWN3WfHC5kan0r0i4tyAyptWKye6vx2PvLn3:5H7FLf4kan0rBP
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4308-1347-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3900 created 3392 3900 pictures and specifications.exe 55 PID 3228 created 3392 3228 fvgoog.exe 55 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation pictures and specifications.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs pictures and specifications.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsPrimitive.vbs fvgoog.exe -
Executes dropped EXE 2 IoCs
pid Process 3228 fvgoog.exe 3492 fvgoog.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3900 set thread context of 4308 3900 pictures and specifications.exe 96 PID 3228 set thread context of 3492 3228 fvgoog.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and specifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvgoog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and specifications.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3900 pictures and specifications.exe 3900 pictures and specifications.exe 3900 pictures and specifications.exe 3228 fvgoog.exe 3228 fvgoog.exe 3228 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe 3492 fvgoog.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3900 pictures and specifications.exe Token: SeDebugPrivilege 3900 pictures and specifications.exe Token: SeDebugPrivilege 4308 pictures and specifications.exe Token: SeDebugPrivilege 3228 fvgoog.exe Token: SeDebugPrivilege 3228 fvgoog.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 3900 wrote to memory of 4308 3900 pictures and specifications.exe 96 PID 4308 wrote to memory of 3228 4308 pictures and specifications.exe 101 PID 4308 wrote to memory of 3228 4308 pictures and specifications.exe 101 PID 4308 wrote to memory of 3228 4308 pictures and specifications.exe 101 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106 PID 3228 wrote to memory of 3492 3228 fvgoog.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"C:\Users\Admin\AppData\Local\Temp\pictures and specifications.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\fvgoog.exe"C:\Users\Admin\AppData\Local\Temp\fvgoog.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\fvgoog.exe"C:\Users\Admin\AppData\Local\Temp\fvgoog.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD52a92df410ae147573fb1ffa5e1431251
SHA12d49c7eb4fb33484a320c2b8ce63cebc3e8222b1
SHA256f39606c32ff9914d13d32a9b69b2142a09491f9e421e1d53cddb7d1f82fef4e3
SHA5125abb6222118a9611955b365dfa722f1156713db8d344cf47dfffbf4a66eac7e83fbcb9548970185dfaece8c22f3b3833c5369a755845b6ad3bf7ee7aaf1c6d17
-
Filesize
86B
MD56c762d94ee2fdac893f6223f532d73d5
SHA18f7aa36c5215433d12e9bab97a393f7767b9258e
SHA256bc13fe6ffecd43e59d593e6e33adf9a2d32fb667c19c7c9680a8b7e6ec3fec3a
SHA512679f857976501def1222e3ff9dce3f52054d7f6368562802919401e8bd23ebe35a96b17949c7f788a75d285356b7770363ef20ddbd62baa6015ea09647269f8c
-
Filesize
177KB
MD576a876e1f9e29d081f9c4f10a98fd80b
SHA1fe02b067c679877599f1bea9c52479b0fa58d974
SHA2566a1cce57aa68523cecd7ed2df58e3332486f857b796376f00673883595cee7df
SHA5122ffde91162d4f1cd2235ca563e93927b55aa40ec62ce19c2e757491953af60db8e4b10cf912b32cf6540dc3a201e08974d7347a92f8ae79fb11724baab8e0127