Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2025, 10:47

General

  • Target

    FullOption_2.1.exe

  • Size

    4.0MB

  • MD5

    2827f985babed58b7225d336befe5d67

  • SHA1

    85779be1feec0cbf65f72c4dea9f325145f7b951

  • SHA256

    427f01eebd57a85f57641b32672d2b65840319cb1121f2b724406a17cdf4948b

  • SHA512

    01ee2a9b40778be0eddabab39402f65825f6e23367dc0c939605b61ba0794f01480c2d62bb9aa6888305c38926b82eca8f5a492e500a734cac240f71cb62d025

  • SSDEEP

    98304:nBRyRmb7gVNx01+tlHuAIiPlVB7gF2xplA:neFNxNTH7lsSG

Score
10/10

Malware Config

Extracted

Family

xworm

C2

popular-specialist.gl.at.ply.gg:39463

Attributes
  • Install_directory

    %AppData%

  • install_file

    Services.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1.exe
    "C:\Users\Admin\AppData\Local\Temp\FullOption_2.1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Roaming\FullOption_2.1.exe
      "C:\Users\Admin\AppData\Roaming\FullOption_2.1.exe"
      2⤵
      • Executes dropped EXE
      PID:2592
    • C:\Users\Admin\AppData\Roaming\System and Application.exe
      "C:\Users\Admin\AppData\Roaming\System and Application.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2792
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xcc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\FullOption_2.1.exe

      Filesize

      3.9MB

      MD5

      2f6e9c0dd1c6859a9d6e7acea1db9ac0

      SHA1

      b0dcd2be62b6a559e479de7745ab0988b8b30522

      SHA256

      122e3cb0f2ad233d1a364911d433667e7778f00d9a7d10b954c994f4e8093d1f

      SHA512

      fe3634f46afd5b45f0ffc721a18b5ef1b1344b548f90b8c54ea6995e3d64b7394b56c681b1a0522b67e862fce9d8333b621612a2f03708e7dbc917a28c58c15d

    • C:\Users\Admin\AppData\Roaming\System and Application.exe

      Filesize

      75KB

      MD5

      a6803eea43873a22a3bc819a28ea1854

      SHA1

      a378736c27f5c6c557bd933d9c613feec85bd8d0

      SHA256

      2447044160e3a41bab3d42e25baa706c1fc8f6d92e9a5fa72deb2a7ec31c8de7

      SHA512

      1a15f39eb6302b1f1dab02f6516a81d8bf749a6f71cea7712814fb5b289607886db3708224253bd964ad4e37d8eeb05c4a9e12f1e90a0cb4b2c351c29bc9c1bb

    • memory/2236-0-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

      Filesize

      4KB

    • memory/2236-1-0x0000000000230000-0x000000000062E000-memory.dmp

      Filesize

      4.0MB

    • memory/2924-12-0x0000000000840000-0x000000000085A000-memory.dmp

      Filesize

      104KB

    • memory/2924-13-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

      Filesize

      9.9MB

    • memory/2924-14-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

      Filesize

      9.9MB

    • memory/2924-15-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

      Filesize

      9.9MB