Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 15:13
Static task
static1
General
-
Target
SystemSettings.rar
-
Size
130KB
-
MD5
cfd1e38ba89d12c7dcb31f7fcc688064
-
SHA1
2d3ee0fa93877e850e625ed3e5f18d3dea70e167
-
SHA256
3e29a57bde610ff61c422796b89fc4332f265cc50e966593fc2b00bb23a13a21
-
SHA512
326ac74f3a27163d591193e323bb84e1ae10bd22ea2fe323c414265e66c5a720f271b8f4de8039989920aeb5937c5b1fdba03d0328427ef94bfee41101064c7f
-
SSDEEP
3072:nrURbAWbGvrMy06g8CdSgtapOYkJGJE+/7thDG/3yWitioCwnk:ObAW1yB7mSgtaEuEyhJlk
Malware Config
Extracted
xworm
5.0
uoqo0jDHykn623lG
-
Install_directory
%Public%
-
install_file
SystemSettings.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/972-35-0x0000000001480000-0x000000000149E000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5992 powershell.exe 3936 powershell.exe 5068 powershell.exe 3224 powershell.exe 3412 powershell.exe 4684 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 5224 SystemSettings.exe 972 SystemSettings.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 41 IoCs
flow ioc 30 pastebin.com 16 pastebin.com 17 pastebin.com 19 pastebin.com 38 pastebin.com 42 pastebin.com 45 pastebin.com 8 pastebin.com 12 pastebin.com 34 pastebin.com 2 pastebin.com 10 pastebin.com 28 pastebin.com 6 pastebin.com 7 pastebin.com 13 pastebin.com 21 pastebin.com 40 pastebin.com 3 pastebin.com 5 pastebin.com 9 pastebin.com 22 pastebin.com 27 pastebin.com 25 pastebin.com 32 pastebin.com 36 pastebin.com 39 pastebin.com 41 pastebin.com 11 pastebin.com 18 pastebin.com 24 pastebin.com 35 pastebin.com 31 pastebin.com 14 pastebin.com 15 pastebin.com 20 pastebin.com 23 pastebin.com 33 pastebin.com 37 pastebin.com 43 pastebin.com 29 pastebin.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\SystemSettings.exe SystemSettings.exe File opened for modification C:\Windows\System32\SystemSettings.exe SystemSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4684 powershell.exe 4684 powershell.exe 5992 powershell.exe 5992 powershell.exe 3936 powershell.exe 3936 powershell.exe 5068 powershell.exe 5068 powershell.exe 3224 powershell.exe 3224 powershell.exe 3412 powershell.exe 3412 powershell.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5856 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 5856 7zFM.exe Token: 35 5856 7zFM.exe Token: SeSecurityPrivilege 5856 7zFM.exe Token: SeDebugPrivilege 5224 SystemSettings.exe Token: SeDebugPrivilege 4684 powershell.exe Token: SeDebugPrivilege 5992 powershell.exe Token: SeDebugPrivilege 972 SystemSettings.exe Token: SeDebugPrivilege 972 SystemSettings.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 4176 taskmgr.exe Token: SeSystemProfilePrivilege 4176 taskmgr.exe Token: SeCreateGlobalPrivilege 4176 taskmgr.exe Token: 33 4176 taskmgr.exe Token: SeIncBasePriorityPrivilege 4176 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 5856 7zFM.exe 5856 7zFM.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5224 wrote to memory of 4684 5224 SystemSettings.exe 82 PID 5224 wrote to memory of 4684 5224 SystemSettings.exe 82 PID 5224 wrote to memory of 5992 5224 SystemSettings.exe 84 PID 5224 wrote to memory of 5992 5224 SystemSettings.exe 84 PID 972 wrote to memory of 3936 972 SystemSettings.exe 89 PID 972 wrote to memory of 3936 972 SystemSettings.exe 89 PID 972 wrote to memory of 5068 972 SystemSettings.exe 91 PID 972 wrote to memory of 5068 972 SystemSettings.exe 91 PID 972 wrote to memory of 3224 972 SystemSettings.exe 93 PID 972 wrote to memory of 3224 972 SystemSettings.exe 93 PID 972 wrote to memory of 3412 972 SystemSettings.exe 95 PID 972 wrote to memory of 3412 972 SystemSettings.exe 95 PID 972 wrote to memory of 5116 972 SystemSettings.exe 97 PID 972 wrote to memory of 5116 972 SystemSettings.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SystemSettings.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5856
-
C:\Users\Admin\Desktop\SystemSettings.exe"C:\Users\Admin\Desktop\SystemSettings.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\System32\SystemSettings.exeC:\Windows\System32\SystemSettings.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SystemSettings.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SystemSettings" /tr "C:\Users\Public\SystemSettings.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5116
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5963a79c885ee44ffee1cd5a204a1b9e4
SHA1830c322fb88a946b08bfa96e2cb94b273a3e906f
SHA2566012ab1a46e5447879241d2e8c35de748cab1f82f4c2cb653224c62dd8f9d6db
SHA512f855ceba097e59342e5b8dde11f0755bf11225782f47a7d3651cb2518572cf93891ba852ef6f422783affe8ed907ad7c5d0f80cb43d53732eacbdb9d0f4a1d37
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD51a8812e69f64e5baf06b854c74a54cc3
SHA18ea0248c2277343089e9a896f76b595e6c1092ff
SHA2565ea252f33d8cb01ca97e593ae29b2373d6786c15b03dde291c00a919434227ac
SHA51260fc8b1a44f1e698a0b56af4425a2daf2dd9065068b6c3d4f484f3686597af2b02189e8cb591959484a3ee1e52f1e017dc935b7af2d929da02205f36deaf8a63
-
Filesize
944B
MD5b53572e2d17619ae41d35cf6e0dccb47
SHA1ca931e853cfdc259d033a6a89182da6f8c4c7617
SHA2565d84c6c0dc45638b6f3e5beb807b31754ecad504b845933d822c1a2c22c637de
SHA512dcc3820410a27124f620ecef61ca46e9dff1a99587174976983a08dcf75796ef68a2dff62de61f19f1ddb799f24fc3c66ea93478126efb7609529c5ab3ce663e
-
Filesize
944B
MD5b0a85f07903eaad4aace8865ff28679f
SHA1caa147464cf2e31bf9b482c3ba3c5c71951566d1
SHA256c85c7915e0bcc6cc3d7dd2f6b9d9e4f9a3cf0ccefa043b1c500facac8428bfd5
SHA5127a650a74a049e71b748f60614723de2b9d2385a0f404606bcb22ae807e22a74c53cf672df9e7a23605dfff37865443a5899eafea323134a818eb59c96e0f94bd
-
Filesize
944B
MD569416944dac24129d0969e2ac46f0533
SHA1d71969659956b32411e0606a9bee640a0b108ef4
SHA256dffc7e01106427982d7cafd3d7e3be37e16b098fbb0958410ea8d7c68bfb97ca
SHA512aabb330053579af0d9de2661bd70eaadfd2e2e617759bc9c380db1c64731c6711304e49882138e9d337815377ee012a7458f91f692cb31538d73624385867f4c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
332KB
MD5701a94f53d54d38a11f4e60bc4f95b18
SHA17413f5e4fc73eaf07d9d6cd67fc88fd40b70d9d0
SHA2569233d5872258aa674b015b57a4f37ca43a22524a682382cd88969cef135dacdb
SHA5124d63f155adbc5271fc82a263c4df29566ffbabb512ad2a7c73736969b29760bc0ae86e58f396907b8afa8791e8a8b042c895f94126a00da8c0b050e7ef343440