Analysis
-
max time kernel
866s -
max time network
888s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 15:00
Behavioral task
behavioral1
Sample
15415145.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
15415145.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
15415145.exe
-
Size
59KB
-
MD5
6c091ad6fae0fa76f44870d1a1b05cb4
-
SHA1
040f60c0ee3f4902f919025057e34ab4d11b1abd
-
SHA256
c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390
-
SHA512
3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86
-
SSDEEP
1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7
Malware Config
Extracted
xworm
3.1
known-savage.gl.at.ply.gg:45116
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4016-1-0x0000000000C90000-0x0000000000CA6000-memory.dmp family_xworm behavioral2/files/0x0007000000027d88-8.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation 15415145.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\15415145.lnk 15415145.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\15415145.lnk 15415145.exe -
Executes dropped EXE 15 IoCs
pid Process 1624 15415145.exe 3800 15415145.exe 4540 15415145.exe 4964 15415145.exe 344 15415145.exe 2980 15415145.exe 840 15415145.exe 2540 15415145.exe 1032 15415145.exe 1556 15415145.exe 4280 15415145.exe 3444 15415145.exe 1080 15415145.exe 996 15415145.exe 2460 15415145.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15415145 = "C:\\Users\\Admin\\AppData\\Roaming\\15415145.exe" 15415145.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Downloads\\hq720.jpg" 15415145.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1104 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2028 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2028 vlc.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4016 15415145.exe Token: SeDebugPrivilege 4016 15415145.exe Token: SeDebugPrivilege 1624 15415145.exe Token: SeDebugPrivilege 3800 15415145.exe Token: SeDebugPrivilege 4540 15415145.exe Token: SeDebugPrivilege 4964 15415145.exe Token: SeDebugPrivilege 344 15415145.exe Token: SeDebugPrivilege 2980 15415145.exe Token: SeDebugPrivilege 840 15415145.exe Token: SeDebugPrivilege 2540 15415145.exe Token: SeDebugPrivilege 1032 15415145.exe Token: SeDebugPrivilege 1556 15415145.exe Token: SeDebugPrivilege 4280 15415145.exe Token: SeDebugPrivilege 3444 15415145.exe Token: SeDebugPrivilege 1080 15415145.exe Token: SeDebugPrivilege 996 15415145.exe Token: SeDebugPrivilege 2460 15415145.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4016 wrote to memory of 1104 4016 15415145.exe 88 PID 4016 wrote to memory of 1104 4016 15415145.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15415145.exe"C:\Users\Admin\AppData\Local\Temp\15415145.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1104
-
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TestExport.DVR-MS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2028
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:344
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:996
-
C:\Users\Admin\AppData\Roaming\15415145.exe"C:\Users\Admin\AppData\Roaming\15415145.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
59KB
MD56c091ad6fae0fa76f44870d1a1b05cb4
SHA1040f60c0ee3f4902f919025057e34ab4d11b1abd
SHA256c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390
SHA5123a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86
-
Filesize
34KB
MD5aff47e2ff9fd81e497ad71efbf98b7e4
SHA168b73e03e1091d17bdc6238ee09bbc3921f7763e
SHA256ba41153adb3da20812546fd66b993dfe27e26ad8daba0da8f92c9abf5ed146b9
SHA5126d8a4c9f3f9899ac16024389f04c8b75c6c9a1f3af06ed8af3e73134a01879cd536b0739ef5b4718e932a889d109a817d7728200f0ef40125821817eef110343