Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe
Resource
win7-20241010-en
General
-
Target
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe
-
Size
103KB
-
MD5
71e0c8f71b15046709d4e250086346a4
-
SHA1
9536f9bc5e10128074cdd2597e970b29d44c4bcd
-
SHA256
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
-
SHA512
15cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba
-
SSDEEP
1536:EfDrLD7tmNEoCfjSbHb7RqWYZvZqF3c9MwsUSEJxY87d17:EHLD7Ewub70Wmy3VwQGxY87r7
Malware Config
Extracted
xworm
5.0
QIUpnGyi0OFuIMGO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2932-1350-0x0000000000180000-0x000000000018E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2216 created 3556 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 56 PID 1088 created 3556 1088 xpokyn.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs xpokyn.exe -
Executes dropped EXE 2 IoCs
pid Process 1088 xpokyn.exe 3936 xpokyn.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2216 set thread context of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 1088 set thread context of 3936 1088 xpokyn.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpokyn.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 1088 xpokyn.exe 1088 xpokyn.exe 1088 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe 3936 xpokyn.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe Token: SeDebugPrivilege 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe Token: SeDebugPrivilege 2932 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe Token: SeDebugPrivilege 1088 xpokyn.exe Token: SeDebugPrivilege 1088 xpokyn.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2216 wrote to memory of 2932 2216 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 96 PID 2932 wrote to memory of 1088 2932 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 106 PID 2932 wrote to memory of 1088 2932 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 106 PID 2932 wrote to memory of 1088 2932 462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe 106 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107 PID 1088 wrote to memory of 3936 1088 xpokyn.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe"C:\Users\Admin\AppData\Local\Temp\462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe"C:\Users\Admin\AppData\Local\Temp\462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\xpokyn.exe"C:\Users\Admin\AppData\Local\Temp\xpokyn.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\xpokyn.exe"C:\Users\Admin\AppData\Local\Temp\xpokyn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5cefa89adbcc7a6fde1275537a8e186ae
SHA1cf1216c8acd4ad38292d151274683380f2af28d0
SHA2565831b83574596f18f4cc1366390b47631c9e1d44a6b2f2479c5a5a880a8cfed3
SHA51298486187f547ef87e8742c49a77123947c5583a0e31e205dc4f4f6aece83d988f54e5221482154f298a2f5c61a4078e63c3008ac2232efc8dddb31298356db88
-
Filesize
80B
MD5f4fb9e3c46515dc09768801bab14093b
SHA1ca65dab35b767894b151d8ddbf7cc2cda7d0ab05
SHA25669d1c0c7d865a56cca713f9e00a60d4a7ebeff8e1f7c491e04d27d2bfd62d91f
SHA5124642f5764ea2db8d9ad1a43611688533379581576175df59e33160d4f53091d6dc333734833ab23a00d21a50d8a497848df8a9e29e996e8bf9073614ef6b2ef6
-
Filesize
103KB
MD571e0c8f71b15046709d4e250086346a4
SHA19536f9bc5e10128074cdd2597e970b29d44c4bcd
SHA256462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
SHA51215cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba