Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
SystemSettings.exe
Resource
win7-20240903-en
General
-
Target
SystemSettings.exe
-
Size
332KB
-
MD5
701a94f53d54d38a11f4e60bc4f95b18
-
SHA1
7413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
-
SHA256
9233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
-
SHA512
4d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440
-
SSDEEP
6144:6qXq7egSKNNO3BLZsgd8+f0Pn95maRWFjt:6qapSKNNOpZsgdQbmamjt
Malware Config
Extracted
xworm
5.0
uoqo0jDHykn623lG
-
Install_directory
%Public%
-
install_file
SystemSettings.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2920-39-0x0000000002E00000-0x0000000002E1E000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1492 powershell.exe 2236 powershell.exe 2408 powershell.exe 2780 powershell.exe 1460 powershell.exe 728 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation SystemSettings.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation SystemSettings.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 SystemSettings.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 42 IoCs
flow ioc 65 pastebin.com 68 pastebin.com 77 pastebin.com 94 pastebin.com 98 pastebin.com 103 pastebin.com 110 pastebin.com 82 pastebin.com 91 pastebin.com 96 pastebin.com 99 pastebin.com 104 pastebin.com 87 pastebin.com 34 pastebin.com 80 pastebin.com 93 pastebin.com 95 pastebin.com 76 pastebin.com 69 pastebin.com 32 pastebin.com 63 pastebin.com 66 pastebin.com 92 pastebin.com 100 pastebin.com 31 pastebin.com 35 pastebin.com 36 pastebin.com 37 pastebin.com 51 pastebin.com 71 pastebin.com 102 pastebin.com 64 pastebin.com 67 pastebin.com 70 pastebin.com 74 pastebin.com 78 pastebin.com 79 pastebin.com 97 pastebin.com 101 pastebin.com 75 pastebin.com 81 pastebin.com 90 pastebin.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\SystemSettings.exe SystemSettings.exe File opened for modification C:\Windows\System32\SystemSettings.exe SystemSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1460 powershell.exe 1460 powershell.exe 728 powershell.exe 728 powershell.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 1492 powershell.exe 1492 powershell.exe 1492 powershell.exe 2676 taskmgr.exe 2676 taskmgr.exe 2236 powershell.exe 2236 powershell.exe 2236 powershell.exe 2408 powershell.exe 2408 powershell.exe 2408 powershell.exe 2676 taskmgr.exe 2780 powershell.exe 2780 powershell.exe 2780 powershell.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3492 SystemSettings.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 728 powershell.exe Token: SeDebugPrivilege 2920 SystemSettings.exe Token: SeDebugPrivilege 2920 SystemSettings.exe Token: SeDebugPrivilege 2676 taskmgr.exe Token: SeSystemProfilePrivilege 2676 taskmgr.exe Token: SeCreateGlobalPrivilege 2676 taskmgr.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe 2676 taskmgr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1460 3492 SystemSettings.exe 85 PID 3492 wrote to memory of 1460 3492 SystemSettings.exe 85 PID 3492 wrote to memory of 728 3492 SystemSettings.exe 88 PID 3492 wrote to memory of 728 3492 SystemSettings.exe 88 PID 2920 wrote to memory of 1492 2920 SystemSettings.exe 106 PID 2920 wrote to memory of 1492 2920 SystemSettings.exe 106 PID 2920 wrote to memory of 2236 2920 SystemSettings.exe 108 PID 2920 wrote to memory of 2236 2920 SystemSettings.exe 108 PID 2920 wrote to memory of 2408 2920 SystemSettings.exe 110 PID 2920 wrote to memory of 2408 2920 SystemSettings.exe 110 PID 2920 wrote to memory of 2780 2920 SystemSettings.exe 112 PID 2920 wrote to memory of 2780 2920 SystemSettings.exe 112 PID 2920 wrote to memory of 4996 2920 SystemSettings.exe 114 PID 2920 wrote to memory of 4996 2920 SystemSettings.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"C:\Users\Admin\AppData\Local\Temp\SystemSettings.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\System32\SystemSettings.exeC:\Windows\System32\SystemSettings.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SystemSettings" /tr "C:\Users\Public\SystemSettings.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5889003c57a6b1561bc8562a18553c377
SHA1b4436b28e7e4ff1d97ab8f718be9e6e6d88c2302
SHA256034c25639af57aab1574a654b6a247c07522968c16ab7f01452bbe679b4bebb8
SHA512bbe40edc739d33af62a7016d2a9fdcf68ed604eae0c617958e561db601625b923b8d931d997fefddc117a1de6b7a2235843713f8d5aac74e8e2dcb8b5fc4d17b
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD53f038ac2e2ceadad0f78317ea7de6881
SHA1f2ee66d1ab22d5594426a26e9d2628ce29b037a7
SHA256475591875182108710538a2ea21a89e0ffa1df43f776689288e0fa96da46efb7
SHA512f751f1f06b79550af211a9bf39d59712bb60f4e2c79a24d850970b1d40e871c2e53ce84ed4f5d974dad53cdbfb95d38a8eff9f871f22ae2d3e772deb731715f4
-
Filesize
944B
MD5a2c8179aaa149c0b9791b73ce44c04d1
SHA1703361b0d43ec7f669304e7c0ffbbfdeb1e484ff
SHA256c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a
SHA5122e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
332KB
MD5701a94f53d54d38a11f4e60bc4f95b18
SHA17413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
SHA2569233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
SHA5124d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440