Analysis
-
max time kernel
44s -
max time network
55s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 21:52
Static task
static1
General
-
Target
XwormLoader.exe
-
Size
7.8MB
-
MD5
239e4c2d3e6553ad53ccc6172a6a11b8
-
SHA1
f7313274cc27c47ca78a476541e0e30e84c4dcbc
-
SHA256
fb05744e6285d0d7eaff70f7b303eb04ed24080af8c31e83b7da0bae16e2c216
-
SHA512
76cce7ec3788db10a1886a27b862f5203c0c8d4294b79efb4512442d8b817be3ea3fb9777e5bacff90e38f14c84a60e319cff23e028dbd9567f4913d94b137f3
-
SSDEEP
196608:7//b4C6XrL5HfZBEhl3xZi5OslC9+PWbXooVl41u1mMFsr3:7/yvRZBEP3xZi5Oso+PWbXooL4Sa3
Malware Config
Extracted
xworm
5.0
217.195.153.81:50000
5UXpujbt6vWtkdEG
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000027dc4-28.dat family_xworm behavioral1/memory/2684-40-0x00000000003C0000-0x00000000003D0000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 520 powershell.exe 5092 powershell.exe 4752 powershell.exe 1324 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\International\Geo\Nation XwormLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2280 Xworm V5.6.exe 2684 svchost.exe 4548 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 520 powershell.exe 520 powershell.exe 5092 powershell.exe 5092 powershell.exe 4752 powershell.exe 4752 powershell.exe 1324 powershell.exe 1324 powershell.exe 2684 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2684 svchost.exe Token: SeDebugPrivilege 520 powershell.exe Token: SeIncreaseQuotaPrivilege 520 powershell.exe Token: SeSecurityPrivilege 520 powershell.exe Token: SeTakeOwnershipPrivilege 520 powershell.exe Token: SeLoadDriverPrivilege 520 powershell.exe Token: SeSystemProfilePrivilege 520 powershell.exe Token: SeSystemtimePrivilege 520 powershell.exe Token: SeProfSingleProcessPrivilege 520 powershell.exe Token: SeIncBasePriorityPrivilege 520 powershell.exe Token: SeCreatePagefilePrivilege 520 powershell.exe Token: SeBackupPrivilege 520 powershell.exe Token: SeRestorePrivilege 520 powershell.exe Token: SeShutdownPrivilege 520 powershell.exe Token: SeDebugPrivilege 520 powershell.exe Token: SeSystemEnvironmentPrivilege 520 powershell.exe Token: SeRemoteShutdownPrivilege 520 powershell.exe Token: SeUndockPrivilege 520 powershell.exe Token: SeManageVolumePrivilege 520 powershell.exe Token: 33 520 powershell.exe Token: 34 520 powershell.exe Token: 35 520 powershell.exe Token: 36 520 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeIncreaseQuotaPrivilege 5092 powershell.exe Token: SeSecurityPrivilege 5092 powershell.exe Token: SeTakeOwnershipPrivilege 5092 powershell.exe Token: SeLoadDriverPrivilege 5092 powershell.exe Token: SeSystemProfilePrivilege 5092 powershell.exe Token: SeSystemtimePrivilege 5092 powershell.exe Token: SeProfSingleProcessPrivilege 5092 powershell.exe Token: SeIncBasePriorityPrivilege 5092 powershell.exe Token: SeCreatePagefilePrivilege 5092 powershell.exe Token: SeBackupPrivilege 5092 powershell.exe Token: SeRestorePrivilege 5092 powershell.exe Token: SeShutdownPrivilege 5092 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeSystemEnvironmentPrivilege 5092 powershell.exe Token: SeRemoteShutdownPrivilege 5092 powershell.exe Token: SeUndockPrivilege 5092 powershell.exe Token: SeManageVolumePrivilege 5092 powershell.exe Token: 33 5092 powershell.exe Token: 34 5092 powershell.exe Token: 35 5092 powershell.exe Token: 36 5092 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeIncreaseQuotaPrivilege 4752 powershell.exe Token: SeSecurityPrivilege 4752 powershell.exe Token: SeTakeOwnershipPrivilege 4752 powershell.exe Token: SeLoadDriverPrivilege 4752 powershell.exe Token: SeSystemProfilePrivilege 4752 powershell.exe Token: SeSystemtimePrivilege 4752 powershell.exe Token: SeProfSingleProcessPrivilege 4752 powershell.exe Token: SeIncBasePriorityPrivilege 4752 powershell.exe Token: SeCreatePagefilePrivilege 4752 powershell.exe Token: SeBackupPrivilege 4752 powershell.exe Token: SeRestorePrivilege 4752 powershell.exe Token: SeShutdownPrivilege 4752 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeSystemEnvironmentPrivilege 4752 powershell.exe Token: SeRemoteShutdownPrivilege 4752 powershell.exe Token: SeUndockPrivilege 4752 powershell.exe Token: SeManageVolumePrivilege 4752 powershell.exe Token: 33 4752 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2684 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2280 1916 XwormLoader.exe 86 PID 1916 wrote to memory of 2280 1916 XwormLoader.exe 86 PID 1916 wrote to memory of 2684 1916 XwormLoader.exe 88 PID 1916 wrote to memory of 2684 1916 XwormLoader.exe 88 PID 2684 wrote to memory of 520 2684 svchost.exe 91 PID 2684 wrote to memory of 520 2684 svchost.exe 91 PID 2684 wrote to memory of 5092 2684 svchost.exe 94 PID 2684 wrote to memory of 5092 2684 svchost.exe 94 PID 2684 wrote to memory of 4752 2684 svchost.exe 96 PID 2684 wrote to memory of 4752 2684 svchost.exe 96 PID 2684 wrote to memory of 1324 2684 svchost.exe 98 PID 2684 wrote to memory of 1324 2684 svchost.exe 98 PID 2684 wrote to memory of 1732 2684 svchost.exe 104 PID 2684 wrote to memory of 1732 2684 svchost.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XwormLoader.exe"C:\Users\Admin\AppData\Local\Temp\XwormLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"2⤵
- Executes dropped EXE
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1732
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"1⤵
- Executes dropped EXE
PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5cbc522fdf7cec274518994aef39b65cf
SHA153d45f79ec006bda079aee381f8dd4e41a81c3cc
SHA256ef0e20a8ea3a7f7c0f9997320f9bda132850d3e6059b23c4186933fb87a26b78
SHA51201f91cbeeb11f184843fc93734e7b01812681a29b5ccc926227654b94ed8f241d19c0900a97f01f8b3d9a7bd97f520dba88e84f67e3f1cf268c3ed45fe8b8e19
-
Filesize
1KB
MD5134467289f2cf9dd9f8419b4fec7906d
SHA1957579bd1b252cff3ac77d4d1aa0da9292ab6824
SHA2569712d9770e500e193b11385223a4861cce8f569e8be785d57efe9f7dcc7715d9
SHA5125cd4cf4b381f169085e70ca78b8743e72ac30ef0109f89684a9fd20c5dfb0d5166518240c17800fb382ec7b04c7831775879b9da928ae6819311d45c7e9715ee
-
Filesize
14.9MB
MD5cac67604904dce94d230953f170d4391
SHA19ea639f23a5699bb66ca5da55b2458347aed6f13
SHA25664e5b7463d340b9a8b9d911860b4d635b0cf68afbe3593ed3cc6cbb13db0b27b
SHA512af358008abb47a345a53dab222a01ab6c0ed10185fca8d2be9af2892161f150c8cc8a7f75272d1eb1acd17b49f32d3531adbc1cfdd153cc7c3e90841cabe766a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
38KB
MD5076f2c93e34a152c270907e33143fdf4
SHA126278090a3e808d79e76ce8dc3ef21f55524c9b4
SHA25659d95ba60294f08afe88b16ca08c6befd1148ec4a120a674fc5bf8287205ebc5
SHA51254cbde7e10665bf039d69df63a05dcd6886a883d51e8354d3cc78f2f0883a80b7441a24108053b9b23bacc4a8cff366fc52fa02e2a10e8f3f9c600a1e9fbe867