Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2025, 08:57

General

  • Target

    cheat.exe

  • Size

    197KB

  • MD5

    6b60d478dc59ba2d30610d57d36a929b

  • SHA1

    0b9240afd4338b4ec6608ea1a2ad4624fe02b1d8

  • SHA256

    e6a07c0c643535a9b65fb286f4fafce14fafef0b830557e2d67f91f06ae2bbbc

  • SHA512

    15967a5595bd8a2d413628a4d4d35f5bf60c3b4529c0d17216d43620918c386de1893e621985e8b04a508353e675f23b857c7fea11fe12aa247f0812626c2d4e

  • SSDEEP

    3072:od9kkHFE9jM/Oju8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLns:oFE9wUhcX7elbKTuq9bfF/H9d9n

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ohsorry-20836.portmap.host:20836

Mutex

BV3jFFIYrb13VXbT

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Disables Task Manager via registry modification
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2432
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\50bee61c-442c-406a-9a00-e025c55e97f2.down_data

    Filesize

    555KB

    MD5

    5683c0028832cae4ef93ca39c8ac5029

    SHA1

    248755e4e1db552e0b6f8651b04ca6d1b31a86fb

    SHA256

    855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

    SHA512

    aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

  • memory/2432-0-0x00007FF8C4953000-0x00007FF8C4955000-memory.dmp

    Filesize

    8KB

  • memory/2432-1-0x0000000000BB0000-0x0000000000BE6000-memory.dmp

    Filesize

    216KB

  • memory/2432-2-0x00007FF8C4950000-0x00007FF8C5412000-memory.dmp

    Filesize

    10.8MB

  • memory/2432-3-0x00007FF8C4950000-0x00007FF8C5412000-memory.dmp

    Filesize

    10.8MB

  • memory/2432-4-0x000000001B8F0000-0x000000001B8FC000-memory.dmp

    Filesize

    48KB

  • memory/2432-5-0x000000001B900000-0x000000001B90E000-memory.dmp

    Filesize

    56KB

  • memory/2432-6-0x0000000002C70000-0x0000000002C7E000-memory.dmp

    Filesize

    56KB