Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
done12312.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
done12312.exe
Resource
win10v2004-20250217-en
General
-
Target
done12312.exe
-
Size
286KB
-
MD5
4ca928ae23fcfa668b951b98f847a10c
-
SHA1
2390606cab60a13706644016b7a6e5498277b14b
-
SHA256
9e6aef22dddfad9f4f3e2b478c59e5091233270da722712011011df2b6cf2ac0
-
SHA512
ce90304762bdcd23b7a7dbc1404a197b2cf267e1399240a91f8c7689efc9e188e20b2e565a1062bb8fd1827a377abaeec4d84992e2b35859bf49537ee763596c
-
SSDEEP
6144:t/Juw3FOBVEqLsGIfkSKM6riUCxaKP6aAON2kQxQxQMMJzCWOG8iZr:t/8w3FCEqI9kSKMmSagPJlx2vJWjGXZr
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4888-4-0x0000000000400000-0x0000000000440000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation done12312.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\done12312.exe done12312.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\done12312.exe done12312.exe -
Executes dropped EXE 5 IoCs
pid Process 3468 done12312.exe 3592 done12312.exe 4152 done12312.exe 1532 done12312.exe 1440 done12312.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\done12312 = "C:\\Users\\Admin\\AppData\\Roaming\\done12312.exe" done12312.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2284 set thread context of 4888 2284 done12312.exe 89 PID 3468 set thread context of 4152 3468 done12312.exe 107 PID 1532 set thread context of 1440 1532 done12312.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3928 2284 WerFault.exe 88 2284 3468 WerFault.exe 105 1280 1532 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language done12312.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1212 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4888 done12312.exe Token: SeDebugPrivilege 4152 done12312.exe Token: SeDebugPrivilege 1440 done12312.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 2284 wrote to memory of 4888 2284 done12312.exe 89 PID 4888 wrote to memory of 1212 4888 done12312.exe 94 PID 4888 wrote to memory of 1212 4888 done12312.exe 94 PID 4888 wrote to memory of 1212 4888 done12312.exe 94 PID 3468 wrote to memory of 3592 3468 done12312.exe 106 PID 3468 wrote to memory of 3592 3468 done12312.exe 106 PID 3468 wrote to memory of 3592 3468 done12312.exe 106 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 3468 wrote to memory of 4152 3468 done12312.exe 107 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111 PID 1532 wrote to memory of 1440 1532 done12312.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\done12312.exe"C:\Users\Admin\AppData\Local\Temp\done12312.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\done12312.exe"C:\Users\Admin\AppData\Local\Temp\done12312.exe"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "done12312" /tr "C:\Users\Admin\AppData\Roaming\done12312.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 7882⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2284 -ip 22841⤵PID:3468
-
C:\Users\Admin\AppData\Roaming\done12312.exeC:\Users\Admin\AppData\Roaming\done12312.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\done12312.exe"C:\Users\Admin\AppData\Roaming\done12312.exe"2⤵
- Executes dropped EXE
PID:3592
-
-
C:\Users\Admin\AppData\Roaming\done12312.exe"C:\Users\Admin\AppData\Roaming\done12312.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 7722⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3468 -ip 34681⤵PID:3284
-
C:\Users\Admin\AppData\Roaming\done12312.exeC:\Users\Admin\AppData\Roaming\done12312.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\done12312.exe"C:\Users\Admin\AppData\Roaming\done12312.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 7642⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1532 -ip 15321⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD55e94b238b014b2475a606db72c39b60f
SHA1a6a2b64884f1a2bb82c0ee7fe0682f9c2c619ed9
SHA25615f497aea89068cc4068fc495ecc93a4e5b6325423d6bf576cb73cae7ff86e48
SHA512f57b4921101ee4c473af007d9eaf502c38681b3249bd8765156a741788b3b672687c0f06b31029aa09e6a8f3159666de6ed5e221fa5188ca7d5ca1c05e992896
-
Filesize
286KB
MD54ca928ae23fcfa668b951b98f847a10c
SHA12390606cab60a13706644016b7a6e5498277b14b
SHA2569e6aef22dddfad9f4f3e2b478c59e5091233270da722712011011df2b6cf2ac0
SHA512ce90304762bdcd23b7a7dbc1404a197b2cf267e1399240a91f8c7689efc9e188e20b2e565a1062bb8fd1827a377abaeec4d84992e2b35859bf49537ee763596c