Analysis
-
max time kernel
176s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
SystemSettings.exe
Resource
win7-20240903-en
General
-
Target
SystemSettings.exe
-
Size
332KB
-
MD5
701a94f53d54d38a11f4e60bc4f95b18
-
SHA1
7413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
-
SHA256
9233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
-
SHA512
4d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440
-
SSDEEP
6144:6qXq7egSKNNO3BLZsgd8+f0Pn95maRWFjt:6qapSKNNOpZsgdQbmamjt
Malware Config
Extracted
xworm
5.0
uoqo0jDHykn623lG
-
Install_directory
%Public%
-
install_file
SystemSettings.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1656-38-0x0000000000AD0000-0x0000000000AEE000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4632 powershell.exe 4596 powershell.exe 2168 powershell.exe 1068 powershell.exe 2916 powershell.exe 2504 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation SystemSettings.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation SystemSettings.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 SystemSettings.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 52 IoCs
flow ioc 101 pastebin.com 117 pastebin.com 69 pastebin.com 103 pastebin.com 108 pastebin.com 114 pastebin.com 120 pastebin.com 51 pastebin.com 68 pastebin.com 72 pastebin.com 83 pastebin.com 94 pastebin.com 105 pastebin.com 115 pastebin.com 87 pastebin.com 32 pastebin.com 33 pastebin.com 34 pastebin.com 104 pastebin.com 116 pastebin.com 118 pastebin.com 119 pastebin.com 30 pastebin.com 90 pastebin.com 96 pastebin.com 121 pastebin.com 67 pastebin.com 73 pastebin.com 97 pastebin.com 100 pastebin.com 102 pastebin.com 92 pastebin.com 35 pastebin.com 36 pastebin.com 79 pastebin.com 81 pastebin.com 86 pastebin.com 95 pastebin.com 99 pastebin.com 66 pastebin.com 71 pastebin.com 80 pastebin.com 84 pastebin.com 93 pastebin.com 106 pastebin.com 107 pastebin.com 29 pastebin.com 46 pastebin.com 70 pastebin.com 82 pastebin.com 85 pastebin.com 98 pastebin.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\SystemSettings.exe SystemSettings.exe File opened for modification C:\Windows\System32\SystemSettings.exe SystemSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\Local Settings taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 4632 powershell.exe 4632 powershell.exe 4596 powershell.exe 4596 powershell.exe 2168 powershell.exe 2168 powershell.exe 1068 powershell.exe 1068 powershell.exe 2916 powershell.exe 2916 powershell.exe 2916 powershell.exe 2504 powershell.exe 2504 powershell.exe 2504 powershell.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 5060 SystemSettings.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 1656 SystemSettings.exe Token: SeDebugPrivilege 1656 SystemSettings.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 4428 taskmgr.exe Token: SeSystemProfilePrivilege 4428 taskmgr.exe Token: SeCreateGlobalPrivilege 4428 taskmgr.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4632 5060 SystemSettings.exe 84 PID 5060 wrote to memory of 4632 5060 SystemSettings.exe 84 PID 5060 wrote to memory of 4596 5060 SystemSettings.exe 90 PID 5060 wrote to memory of 4596 5060 SystemSettings.exe 90 PID 1656 wrote to memory of 2168 1656 SystemSettings.exe 98 PID 1656 wrote to memory of 2168 1656 SystemSettings.exe 98 PID 1656 wrote to memory of 1068 1656 SystemSettings.exe 100 PID 1656 wrote to memory of 1068 1656 SystemSettings.exe 100 PID 1656 wrote to memory of 2916 1656 SystemSettings.exe 104 PID 1656 wrote to memory of 2916 1656 SystemSettings.exe 104 PID 1656 wrote to memory of 2504 1656 SystemSettings.exe 106 PID 1656 wrote to memory of 2504 1656 SystemSettings.exe 106 PID 1656 wrote to memory of 3468 1656 SystemSettings.exe 108 PID 1656 wrote to memory of 3468 1656 SystemSettings.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\System32\SystemSettings.exeC:\Windows\System32\SystemSettings.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SystemSettings" /tr "C:\Users\Public\SystemSettings.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3468
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5889003c57a6b1561bc8562a18553c377
SHA1b4436b28e7e4ff1d97ab8f718be9e6e6d88c2302
SHA256034c25639af57aab1574a654b6a247c07522968c16ab7f01452bbe679b4bebb8
SHA512bbe40edc739d33af62a7016d2a9fdcf68ed604eae0c617958e561db601625b923b8d931d997fefddc117a1de6b7a2235843713f8d5aac74e8e2dcb8b5fc4d17b
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD51fb15474bd9f6310d756d117c40b0e22
SHA13df1e642a910ef775a20ac3ba52583a99750e1c6
SHA256e14714956a528d1f401de4025b49efedeef2dbb9b9f77580b74feaf77206dbb1
SHA5122e486d5793dc15cd5c9c652e9aaabf4811149f1dce7cda81d54681581458a1897869ca58ad0b75aed1cd5fd0c87437742510b1df9c3cb3a5bd2c865ef3167af7
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD5a2c8179aaa149c0b9791b73ce44c04d1
SHA1703361b0d43ec7f669304e7c0ffbbfdeb1e484ff
SHA256c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a
SHA5122e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
332KB
MD5701a94f53d54d38a11f4e60bc4f95b18
SHA17413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
SHA2569233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
SHA5124d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440