Analysis

  • max time kernel
    119s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 14:50

General

  • Target

    SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe

  • Size

    315KB

  • MD5

    918f83cd6d935bd729990142f8e276e0

  • SHA1

    bd15b5a29a83b86d1ab177f16f6d0f3a54dc6741

  • SHA256

    8f8830b812c8f50559cddc20140148f16c2c6681b8087da382aab91a1d22e088

  • SHA512

    c8e529a268fa1ca589d362538b9b9368a518cdead33cbe383dbb7ffdcced101950911e0cea4ebf0b5343583e48e3b8b490c3167874505a09d53da57cf25f05f1

  • SSDEEP

    1536:LTJkxPIwcXpo/s/wyQC7CEJ0nMbYcj/RPc4YjDI4ox0V+s4jDu3Eyufeso1+qUQB:LNqP3UW/s4LQYGhcC1yufwqXYoQN

Malware Config

Extracted

Family

xworm

Version

5.0

C2

185.7.214.211:4444

aes.plain

Signatures

  • Detect Xworm Payload 7 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4og4bv4t\4og4bv4t.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES537D.tmp" "c:\Users\Admin\AppData\Local\Temp\4og4bv4t\CSC1EEE7CBE5E2F4C1AA156AA84D3A6D3BE.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2276
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4og4bv4t\4og4bv4t.dll

    Filesize

    41KB

    MD5

    db5db9d201742ad2d9aee11ae460d897

    SHA1

    4e35f0e54ea2f13b0b1f3c447d76a9ad3700310b

    SHA256

    71363ace078f866d191f74dfa1ab5118837fe3c62cd64465d1667acd51415676

    SHA512

    06301410dab200d5ad04f7b6b336088588cf2e3e0ffe4685b7b5b937acd2e2d05246bd5bb04d29fce5650ac3f4c009952e1e6840d099634516531ca9d70197e0

  • C:\Users\Admin\AppData\Local\Temp\RES537D.tmp

    Filesize

    1KB

    MD5

    f1d4c84511fdc53de1db69d7ee51b201

    SHA1

    80bb1a888f6e6a861dbfc7d3028825580444dace

    SHA256

    72bbc633f054339b3bdda8b29ae391abc76b6c918e01246b734a838815efe3e5

    SHA512

    7130745fe785935f8fb4daac6efa459cf9a4f60a66658621ea67ef8a314e9e854621501552241b06318590d9cf05b4a3e74562107f3f57f92893c49aeed9319e

  • \??\c:\Users\Admin\AppData\Local\Temp\4og4bv4t\4og4bv4t.0.cs

    Filesize

    101KB

    MD5

    321752ec5d5fef01d4f146035796f9df

    SHA1

    a46dbf6fb95d498fd733d4fde9a3d1b5917ba1f3

    SHA256

    9e9c63652e73aeaf0904794cfe6428f5f72faa493a6d9815dadceb3ef911a393

    SHA512

    5a52ac4a13f4bb6b5813fc3ca446e3366e4902acb7675356a2d675ee612d2bd3affdebc1c446e59a1cc2ab64640b59a09b2e00c25729ccb4c93b1985249b9d73

  • \??\c:\Users\Admin\AppData\Local\Temp\4og4bv4t\4og4bv4t.cmdline

    Filesize

    204B

    MD5

    9bfef409541072064617673ce616a2a8

    SHA1

    1d10055240f7b135914e0415991693e47177e064

    SHA256

    c9cbed93e578a7ecf0e764ec8e2b049846ed8a26bbe4d9cce4485d501ede1d79

    SHA512

    b326e2f81d779baa1c7e0c82da9cfef089b8c8e6fe7de43ad656648ed5026483be16e7a993a89c224e874d713c98f9663598ea83b37bbd10f6586a97133e0467

  • \??\c:\Users\Admin\AppData\Local\Temp\4og4bv4t\CSC1EEE7CBE5E2F4C1AA156AA84D3A6D3BE.TMP

    Filesize

    652B

    MD5

    d0c26bf23276e01a0d10f1f74f0b0b98

    SHA1

    2b5b7e88bc9776b6e756c60735a8f113e412b6a8

    SHA256

    b854fed1db14f34b5a43b505b97e1bf86fdc8fe2f0d75273240488bd0b2da1aa

    SHA512

    694c9e710340d8fbda7c9b3f0be2dc32e47884beb9d1fc42646700d5d8a5ec6af3b95a98c30d42f5725aafaa3bfb3c2717ca39189e74f33f9d6d7e278eb881b6

  • memory/2380-28-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2380-0-0x000000007441E000-0x000000007441F000-memory.dmp

    Filesize

    4KB

  • memory/2380-1-0x0000000001220000-0x0000000001274000-memory.dmp

    Filesize

    336KB

  • memory/2380-15-0x0000000000200000-0x0000000000210000-memory.dmp

    Filesize

    64KB

  • memory/2380-5-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2628-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2628-27-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-25-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-18-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-19-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-17-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-29-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2628-30-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2628-31-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2628-32-0x0000000074410000-0x0000000074AFE000-memory.dmp

    Filesize

    6.9MB