Analysis
-
max time kernel
127s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/03/2025, 13:49
Behavioral task
behavioral1
Sample
ILOADER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ILOADER.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
ILOADER.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
ILOADER.exe
Resource
win11-20250217-en
General
-
Target
ILOADER.exe
-
Size
102KB
-
MD5
f3071053a4a5b7c6116390e2d4aed29d
-
SHA1
5056680a6e64137d31edfcd8a163225c642badc9
-
SHA256
a52967cd57ab936447fb9d631ea2c1caa904aa37b698ac18919d57e42017df55
-
SHA512
db7398671f2c9e49d81691edb7157f6dc98eea14e9034bbbf86a21a1ad190d4b3a04a6a640979dc3e7535e9ca4c62a68aa4df0c9d6c3f78c59724842eceb1f0d
-
SSDEEP
3072:H3/zbgow3dlSHbG+btjnOBQnC3GDNdZwCxaOKFmh5:H3/vgZsPbpCKGLMh
Malware Config
Extracted
xworm
26.ip.gl.ply.gg:45556
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7993755657:AAFO640EjOsY8e2cOR8daPzBSHn1uGW4C9s/sendMessage?chat_id=6749074492
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral4/memory/4996-1-0x0000000000D90000-0x0000000000DAE000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1928 powershell.exe 5436 powershell.exe 3708 powershell.exe 6140 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" ILOADER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1928 powershell.exe 1928 powershell.exe 5436 powershell.exe 5436 powershell.exe 3708 powershell.exe 3708 powershell.exe 6140 powershell.exe 6140 powershell.exe 4996 ILOADER.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4996 ILOADER.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 5436 powershell.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 6140 powershell.exe Token: SeDebugPrivilege 4996 ILOADER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4996 ILOADER.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1928 4996 ILOADER.exe 82 PID 4996 wrote to memory of 1928 4996 ILOADER.exe 82 PID 4996 wrote to memory of 5436 4996 ILOADER.exe 84 PID 4996 wrote to memory of 5436 4996 ILOADER.exe 84 PID 4996 wrote to memory of 3708 4996 ILOADER.exe 86 PID 4996 wrote to memory of 3708 4996 ILOADER.exe 86 PID 4996 wrote to memory of 6140 4996 ILOADER.exe 88 PID 4996 wrote to memory of 6140 4996 ILOADER.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ILOADER.exe"C:\Users\Admin\AppData\Local\Temp\ILOADER.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ILOADER.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ILOADER.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5aa4f31835d07347297d35862c9045f4a
SHA183e728008935d30f98e5480fba4fbccf10cefb05
SHA25699c83bc5c531e49d4240700142f3425aba74e18ebcc23556be32238ffde9cce0
SHA512ec3a4bee8335007b8753ae8ac42287f2b3bcbb258f7fc3fb15c9f8d3e611cb9bf6ae2d3034953286a34f753e9ec33f7495e064bab0e8c7fcedd75d6e5eb66629
-
Filesize
944B
MD53f6782e9efc05a9bf8b8dc803a5fcbc9
SHA1f610eaa889a504cf1118ec63bcc504c4b797e8c6
SHA256774db181f85af841f045f785f8e253c72848fc4bd0fb867f67c5e8dcbb19064a
SHA512a404de6b21c032b4cad6569816c4e7d95a025191a4b4ce7d312bbd2bc71c868413e2b790433641714c1120c52712ae43c45cb7a9c9be59f18031c01a773ab4c3
-
Filesize
944B
MD58082885362359f72fb414d2fa6ad357d
SHA1c6111820bcf1adf9ac4e8a441d984790465b6393
SHA2560b70605985f4148a236426049c44406110e9edc165a0501f636015a30340beef
SHA512b5d227b5ac6549566d7456616b98fe9aa62f6721be43a9e5674c35c2c9d218f7fec0fea978bdaff3ec73b6591c6e41efa8946526c2ab473da1c443a5a851a145
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82