Analysis

  • max time kernel
    133s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 14:07

General

  • Target

    ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe

  • Size

    505KB

  • MD5

    6322038622ac996a0223263c05856334

  • SHA1

    7a7352d5cd674107fc5833dd2721166184a7f9e9

  • SHA256

    ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df

  • SHA512

    f6a66cc33bf5e1dc26e4d1453a31752085710feb086fe6c54085f96f80f0cf8fc631bffab0eea2477fcb5d0331960c7f9d16013e84efbaacd2dddc962935a47c

  • SSDEEP

    12288:lQAbZWUBjE8e3Pajq4fKIeKRcDD7hnGYpu2YpJTDT:l1bYUa8Esq6KACRUr9T

Malware Config

Extracted

Family

xworm

Version

3.1

C2

ezizanneyaw.duckdns.org:4266

Mutex

FiTlvrJ9jlda8Vht

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 5 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe
    "C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qaRRAFGceHfmko.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qaRRAFGceHfmko" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33C.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2404
    • C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe
      "C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe"
      2⤵
        PID:2864
      • C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe
        "C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe"
        2⤵
        • Drops startup file
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2884
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2220
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp33C.tmp

      Filesize

      1KB

      MD5

      09d038ac59507f63807da89ab5a2133e

      SHA1

      13906cc898edb830b5176949d2d851a63342087b

      SHA256

      570710f3228c153948a1b1dc165143731b1930b0d2ca9e3f338698c6aa8197a9

      SHA512

      78c13a9237f5703ce732b4b5ab742ffd0e9f6461dd321dc087fb9d223439940b10e9cd38e34abff044acb6334d7a35c7d59985624a5ce00454c60fc0b72f110f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      d071a4bbbc509a59d74b558aa77cdfd2

      SHA1

      f1bbd8d48ea604ef8ac77d47761897c161c06760

      SHA256

      3e25fe26e5eb0f37c079744810c6259e181a247eaf21b19ff5044d545dcb9879

      SHA512

      50c98ab8de1fc8dc9257ba8703fdb81edf5b887d57216f0a199b8bb5eafddd0d53f3f14112656ba0ae7dd47728facaa25be59f64ae52f337899fe5e911f04ec9

    • C:\Users\Admin\AppData\Roaming\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe

      Filesize

      505KB

      MD5

      6322038622ac996a0223263c05856334

      SHA1

      7a7352d5cd674107fc5833dd2721166184a7f9e9

      SHA256

      ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df

      SHA512

      f6a66cc33bf5e1dc26e4d1453a31752085710feb086fe6c54085f96f80f0cf8fc631bffab0eea2477fcb5d0331960c7f9d16013e84efbaacd2dddc962935a47c

    • memory/1976-27-0x0000000074D30000-0x000000007541E000-memory.dmp

      Filesize

      6.9MB

    • memory/1976-1-0x0000000000280000-0x0000000000304000-memory.dmp

      Filesize

      528KB

    • memory/1976-2-0x0000000074D30000-0x000000007541E000-memory.dmp

      Filesize

      6.9MB

    • memory/1976-3-0x0000000000540000-0x000000000055E000-memory.dmp

      Filesize

      120KB

    • memory/1976-4-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

      Filesize

      4KB

    • memory/1976-5-0x0000000074D30000-0x000000007541E000-memory.dmp

      Filesize

      6.9MB

    • memory/1976-6-0x00000000001C0000-0x0000000000214000-memory.dmp

      Filesize

      336KB

    • memory/1976-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

      Filesize

      4KB

    • memory/2892-14-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-23-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2892-20-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-24-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-26-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-18-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2892-16-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB