Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 16:07

General

  • Target

    e16acddcf30e48f1a412228269ec7ee0.exe

  • Size

    315KB

  • MD5

    e16acddcf30e48f1a412228269ec7ee0

  • SHA1

    c431b49d1a8c7154a90fff36f97ff28497d1e690

  • SHA256

    12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9

  • SHA512

    2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16

  • SSDEEP

    3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ

Malware Config

Extracted

Family

xworm

Version

5.0

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e16acddcf30e48f1a412228269ec7ee0.exe
    "C:\Users\Admin\AppData\Local\Temp\e16acddcf30e48f1a412228269ec7ee0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5vg31be1\5vg31be1.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF5C.tmp" "c:\Users\Admin\AppData\Local\Temp\5vg31be1\CSC8B62215C66C14BF39BA9949AD187018.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2364
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:2724
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:2744
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:2804
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
              PID:2808
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
                PID:2824

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\5vg31be1\5vg31be1.dll

              Filesize

              41KB

              MD5

              b894f9da05f02c3641d9835473cec9da

              SHA1

              13e769cbd6460816c81c040f61c06c49aa6f16c5

              SHA256

              d59bf1c06f59e51c8d77eabdae0f74c8f851ff2d9563475e9c6abffebda52f41

              SHA512

              4c90062fb9b31f4bbbf0bcf423dc8eeeb32f27184cf40a1976a502c5b5a9f9046c3965e6247ae30cff04f46c82dc6b874da88593f87c5b4d9c2de03c13165810

            • C:\Users\Admin\AppData\Local\Temp\RESF5C.tmp

              Filesize

              1KB

              MD5

              fd95909df4eb2eb4dc67910b1d28e7eb

              SHA1

              a688c0aacd84a5eb19b51bf87085b814da90e5a2

              SHA256

              952167207b2f7a280c074a108f8a9c682cbe08e2a4051474bfdaabaaa0461de7

              SHA512

              04a147e4da6aead1ddea2bab515b3cc0e41e605b44b5bd1796d38b8584f3d8488e4f4d2808fd57b845a7171f3cbc92b3069d02bb620df1dcbcbe736f3f418c93

            • \??\c:\Users\Admin\AppData\Local\Temp\5vg31be1\5vg31be1.0.cs

              Filesize

              101KB

              MD5

              fcb83d623452e1cafbc3b0ad5b3b5b73

              SHA1

              abc26af231584f50ca2ae6de25d4c4764eaf7a9f

              SHA256

              d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc

              SHA512

              41a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8

            • \??\c:\Users\Admin\AppData\Local\Temp\5vg31be1\5vg31be1.cmdline

              Filesize

              204B

              MD5

              9dcf3081ae5a2b33f14931288da23527

              SHA1

              8773babb14729dc4c02b96a8263a95b52c881f00

              SHA256

              e1c4e89cc99e7381cc561b7842fe046dee624f8391957b3f90a54867e4e2ae83

              SHA512

              4d3c4a23886a3bb2ff6cbc7b1da53e1f2178bdad90a004b95829a07c16d84dfa826a5b43f8e3fd88b1b3f18afad7a73875ddd7902f08ff02bd3fdf14959a253b

            • \??\c:\Users\Admin\AppData\Local\Temp\5vg31be1\CSC8B62215C66C14BF39BA9949AD187018.TMP

              Filesize

              652B

              MD5

              ff5a59539923036935403f3ddcc4a3f8

              SHA1

              614cd96e59fa0637a97e437f6cfab8f700590261

              SHA256

              6ff1f2d74667590fca981e620e0cb83f6e9390153e0e122590919697c555733c

              SHA512

              b6beb428aca07526923dd2dabd5825745c383b90306b618f0a5a491c13a770072cfc1e08a5af93d534064328ac161832b8d7ccda367876b49173019e8c959a5b

            • memory/1104-0-0x000000007445E000-0x000000007445F000-memory.dmp

              Filesize

              4KB

            • memory/1104-1-0x0000000000080000-0x00000000000D4000-memory.dmp

              Filesize

              336KB

            • memory/1104-4-0x0000000074450000-0x0000000074B3E000-memory.dmp

              Filesize

              6.9MB

            • memory/1104-15-0x0000000000340000-0x0000000000350000-memory.dmp

              Filesize

              64KB

            • memory/1104-17-0x0000000074450000-0x0000000074B3E000-memory.dmp

              Filesize

              6.9MB