Resubmissions

06/03/2025, 15:32

250306-syztyssmz2 10

06/03/2025, 15:00

250306-sdfwca1r18 10

Analysis

  • max time kernel
    866s
  • max time network
    888s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 15:00

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1104
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1624
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3800
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4540
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TestExport.DVR-MS"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2028
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4964
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:344
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2980
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:840
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2540
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1032
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1556
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4280
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3444
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1080
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:996
  • C:\Users\Admin\AppData\Roaming\15415145.exe
    "C:\Users\Admin\AppData\Roaming\15415145.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

    Filesize

    654B

    MD5

    11c6e74f0561678d2cf7fc075a6cc00c

    SHA1

    535ee79ba978554abcb98c566235805e7ea18490

    SHA256

    d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

    SHA512

    32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

  • C:\Users\Admin\AppData\Roaming\15415145.exe

    Filesize

    59KB

    MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

    SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

    SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

    SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • C:\Users\Admin\Downloads\hq720.jpg

    Filesize

    34KB

    MD5

    aff47e2ff9fd81e497ad71efbf98b7e4

    SHA1

    68b73e03e1091d17bdc6238ee09bbc3921f7763e

    SHA256

    ba41153adb3da20812546fd66b993dfe27e26ad8daba0da8f92c9abf5ed146b9

    SHA512

    6d8a4c9f3f9899ac16024389f04c8b75c6c9a1f3af06ed8af3e73134a01879cd536b0739ef5b4718e932a889d109a817d7728200f0ef40125821817eef110343

  • memory/1624-19-0x00007FFC041D0000-0x00007FFC04C92000-memory.dmp

    Filesize

    10.8MB

  • memory/1624-16-0x00007FFC041D0000-0x00007FFC04C92000-memory.dmp

    Filesize

    10.8MB

  • memory/2028-50-0x00007FFBF8CD0000-0x00007FFBF9D80000-memory.dmp

    Filesize

    16.7MB

  • memory/2028-49-0x00007FFBFCE90000-0x00007FFBFD146000-memory.dmp

    Filesize

    2.7MB

  • memory/2028-48-0x00007FFC14070000-0x00007FFC140A4000-memory.dmp

    Filesize

    208KB

  • memory/2028-47-0x00007FF7EF710000-0x00007FF7EF808000-memory.dmp

    Filesize

    992KB

  • memory/4016-11-0x00007FFC041D3000-0x00007FFC041D5000-memory.dmp

    Filesize

    8KB

  • memory/4016-17-0x000000001DD80000-0x000000001E2A8000-memory.dmp

    Filesize

    5.2MB

  • memory/4016-13-0x000000001C500000-0x000000001C50E000-memory.dmp

    Filesize

    56KB

  • memory/4016-12-0x00007FFC041D0000-0x00007FFC04C92000-memory.dmp

    Filesize

    10.8MB

  • memory/4016-0-0x00007FFC041D3000-0x00007FFC041D5000-memory.dmp

    Filesize

    8KB

  • memory/4016-10-0x00007FFC041D0000-0x00007FFC04C92000-memory.dmp

    Filesize

    10.8MB

  • memory/4016-1-0x0000000000C90000-0x0000000000CA6000-memory.dmp

    Filesize

    88KB

  • memory/4016-51-0x0000000001310000-0x0000000001392000-memory.dmp

    Filesize

    520KB

  • memory/4016-53-0x00000000012F0000-0x00000000012FA000-memory.dmp

    Filesize

    40KB