Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
SystemSettings.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
SystemSettings.exe
-
Size
332KB
-
MD5
701a94f53d54d38a11f4e60bc4f95b18
-
SHA1
7413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
-
SHA256
9233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
-
SHA512
4d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440
-
SSDEEP
6144:6qXq7egSKNNO3BLZsgd8+f0Pn95maRWFjt:6qapSKNNOpZsgdQbmamjt
Malware Config
Extracted
xworm
5.0
uoqo0jDHykn623lG
-
Install_directory
%Public%
-
install_file
SystemSettings.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1128-37-0x00000000023B0000-0x00000000023CE000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2260 powershell.exe 4120 powershell.exe 1172 powershell.exe 5104 powershell.exe 764 powershell.exe 532 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 SystemSettings.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 42 IoCs
flow ioc 22 pastebin.com 28 pastebin.com 30 pastebin.com 36 pastebin.com 40 pastebin.com 8 pastebin.com 14 pastebin.com 21 pastebin.com 27 pastebin.com 38 pastebin.com 43 pastebin.com 20 pastebin.com 23 pastebin.com 24 pastebin.com 32 pastebin.com 39 pastebin.com 5 pastebin.com 9 pastebin.com 16 pastebin.com 25 pastebin.com 35 pastebin.com 2 pastebin.com 15 pastebin.com 17 pastebin.com 26 pastebin.com 34 pastebin.com 4 pastebin.com 13 pastebin.com 33 pastebin.com 37 pastebin.com 1 pastebin.com 7 pastebin.com 10 pastebin.com 11 pastebin.com 18 pastebin.com 19 pastebin.com 42 pastebin.com 44 pastebin.com 6 pastebin.com 12 pastebin.com 31 pastebin.com 41 pastebin.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\SystemSettings.exe SystemSettings.exe File opened for modification C:\Windows\System32\SystemSettings.exe SystemSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2260 powershell.exe 2260 powershell.exe 4120 powershell.exe 4120 powershell.exe 1172 powershell.exe 1172 powershell.exe 5104 powershell.exe 5104 powershell.exe 764 powershell.exe 764 powershell.exe 532 powershell.exe 532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 5008 SystemSettings.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 1128 SystemSettings.exe Token: SeDebugPrivilege 1128 SystemSettings.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 532 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5008 wrote to memory of 2260 5008 SystemSettings.exe 80 PID 5008 wrote to memory of 2260 5008 SystemSettings.exe 80 PID 5008 wrote to memory of 4120 5008 SystemSettings.exe 83 PID 5008 wrote to memory of 4120 5008 SystemSettings.exe 83 PID 1128 wrote to memory of 1172 1128 SystemSettings.exe 86 PID 1128 wrote to memory of 1172 1128 SystemSettings.exe 86 PID 1128 wrote to memory of 5104 1128 SystemSettings.exe 88 PID 1128 wrote to memory of 5104 1128 SystemSettings.exe 88 PID 1128 wrote to memory of 764 1128 SystemSettings.exe 90 PID 1128 wrote to memory of 764 1128 SystemSettings.exe 90 PID 1128 wrote to memory of 532 1128 SystemSettings.exe 92 PID 1128 wrote to memory of 532 1128 SystemSettings.exe 92 PID 1128 wrote to memory of 4968 1128 SystemSettings.exe 94 PID 1128 wrote to memory of 4968 1128 SystemSettings.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\System32\SystemSettings.exeC:\Windows\System32\SystemSettings.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SystemSettings" /tr "C:\Users\Public\SystemSettings.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5963a79c885ee44ffee1cd5a204a1b9e4
SHA1830c322fb88a946b08bfa96e2cb94b273a3e906f
SHA2566012ab1a46e5447879241d2e8c35de748cab1f82f4c2cb653224c62dd8f9d6db
SHA512f855ceba097e59342e5b8dde11f0755bf11225782f47a7d3651cb2518572cf93891ba852ef6f422783affe8ed907ad7c5d0f80cb43d53732eacbdb9d0f4a1d37
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD59e8dce07aae2350e535f215eb4d48a9b
SHA11aec6afe5755965bcef043678bd947da2fc035e6
SHA256f1951f097ce73de14418cec40b51e9a27ee0baea0a6d778f96eb8518d6b3ee7d
SHA51242607684b3f33411d87f607dcd1f6242b1bb112571dcf1c21b19a7bbd0d6051c47c3faff42b43669abf217239b0b04c94277bf653f73572bba3bbcbf20bd08e2
-
Filesize
944B
MD5aa6b748cd8f3e3c0e41549529b919e21
SHA15a4b9721f9fb5042f6ef7afd698d5ac5216a88bb
SHA256d7d665a42f940443efb28eb231dfe1c4062394e71fba145d6eea9ec075b0f0e8
SHA512361c523f49428a7e430279099e669a1a8af8764653f42e83105c0da3f8e8dd3be6c1719ea8c158d8f2e8425d74457147a4683190eb4a67019b9d02be44c13534
-
Filesize
944B
MD5b0a85f07903eaad4aace8865ff28679f
SHA1caa147464cf2e31bf9b482c3ba3c5c71951566d1
SHA256c85c7915e0bcc6cc3d7dd2f6b9d9e4f9a3cf0ccefa043b1c500facac8428bfd5
SHA5127a650a74a049e71b748f60614723de2b9d2385a0f404606bcb22ae807e22a74c53cf672df9e7a23605dfff37865443a5899eafea323134a818eb59c96e0f94bd
-
Filesize
944B
MD50b59f3fa12628f63b5713c4833570d7f
SHA1badcf18f1fdc94b1eadf63f27c09ad092c4a6ccb
SHA2562332e52881483559d787508831c00192c4f0a4fedc232b0309e566a30247af1d
SHA51201724fd9f7a20ec5ff3d2686593d5d95069135834e9b156ced36985067fb36e7b3ec2a0018e41fa125ad5d1e42c80be9e148632a9b655f2d41c1400a4320abe7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
332KB
MD5701a94f53d54d38a11f4e60bc4f95b18
SHA17413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
SHA2569233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
SHA5124d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440