Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 13:49
Behavioral task
behavioral1
Sample
ILOADER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ILOADER.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
ILOADER.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
ILOADER.exe
Resource
win11-20250217-en
General
-
Target
ILOADER.exe
-
Size
102KB
-
MD5
f3071053a4a5b7c6116390e2d4aed29d
-
SHA1
5056680a6e64137d31edfcd8a163225c642badc9
-
SHA256
a52967cd57ab936447fb9d631ea2c1caa904aa37b698ac18919d57e42017df55
-
SHA512
db7398671f2c9e49d81691edb7157f6dc98eea14e9034bbbf86a21a1ad190d4b3a04a6a640979dc3e7535e9ca4c62a68aa4df0c9d6c3f78c59724842eceb1f0d
-
SSDEEP
3072:H3/zbgow3dlSHbG+btjnOBQnC3GDNdZwCxaOKFmh5:H3/vgZsPbpCKGLMh
Malware Config
Extracted
xworm
26.ip.gl.ply.gg:45556
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7993755657:AAFO640EjOsY8e2cOR8daPzBSHn1uGW4C9s/sendMessage?chat_id=6749074492
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1868-1-0x0000000000340000-0x000000000035E000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2808 powershell.exe 2868 powershell.exe 1736 powershell.exe 3044 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" ILOADER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2808 powershell.exe 2868 powershell.exe 1736 powershell.exe 3044 powershell.exe 1868 ILOADER.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1868 ILOADER.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 1868 ILOADER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 ILOADER.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2808 1868 ILOADER.exe 30 PID 1868 wrote to memory of 2808 1868 ILOADER.exe 30 PID 1868 wrote to memory of 2808 1868 ILOADER.exe 30 PID 1868 wrote to memory of 2868 1868 ILOADER.exe 32 PID 1868 wrote to memory of 2868 1868 ILOADER.exe 32 PID 1868 wrote to memory of 2868 1868 ILOADER.exe 32 PID 1868 wrote to memory of 1736 1868 ILOADER.exe 34 PID 1868 wrote to memory of 1736 1868 ILOADER.exe 34 PID 1868 wrote to memory of 1736 1868 ILOADER.exe 34 PID 1868 wrote to memory of 3044 1868 ILOADER.exe 36 PID 1868 wrote to memory of 3044 1868 ILOADER.exe 36 PID 1868 wrote to memory of 3044 1868 ILOADER.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ILOADER.exe"C:\Users\Admin\AppData\Local\Temp\ILOADER.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ILOADER.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ILOADER.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e93cb6b4a6dcfb86756f374039532b5a
SHA17dacdc0a61019f1b7f3ba54d9efa219e90f057ae
SHA25680e83f741c13f3393b080fc9fc09f4d18474bc3e5d50628517b07ba8775a8f1f
SHA5123fa85b4fdfdc2ed3c8111e24a39924f020e0378f8ea1956ec3edecab231e9bfb3280d2c201a215b18e08730430179f74078bc5e810bd3ca7129b644b9239e800