Analysis

  • max time kernel
    54s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 16:22

General

  • Target

    update.exe

  • Size

    221KB

  • MD5

    c2bc3732467892cdf222c9161773405a

  • SHA1

    43770742e6a28930a1cc4e415e7e03df870c9e92

  • SHA256

    b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca

  • SHA512

    6c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1

  • SSDEEP

    3072:Gj+C7lQ52Mrb/xqHuXxcKXnlzlbm9EHBAnpK37nXZ8j0uIQ7bnPs074tyJhXgK0J:o77MrQO58VxnPJqta

Malware Config

Extracted

Family

xworm

Version

3.0

C2

147.185.221.26:27759

Mutex

39bfHGiD4o1FzWnH

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\update.exe
    "C:\Users\Admin\AppData\Local\Temp\update.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\RtkAudUService64.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2776
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {97195EFA-8A5C-45EC-BD0A-7EACD9AC48D1} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\RtkAudUService64.exe
      C:\Windows\RtkAudUService64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RtkAudUService64" /tr "C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:308
    • C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe
      C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    bdd26cea462a15d44abfd52c6d833689

    SHA1

    3262033ffd9fab1cd5134b05bfdec12478e81424

    SHA256

    927ea7b7a13baa0b9db0e9a28d55554b9320eeb5eae9ab68729b95d3b804b158

    SHA512

    c3cadc5a4d1ed16e8ff2da507f47f828daba7ec54cb6aa4204ef80d93be6694262f452c72dccaa421a5f93476cc1250fd01db1126ae712bfb293c1d61af4970b

  • C:\Windows\RtkAudUService64.exe

    Filesize

    221KB

    MD5

    c2bc3732467892cdf222c9161773405a

    SHA1

    43770742e6a28930a1cc4e415e7e03df870c9e92

    SHA256

    b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca

    SHA512

    6c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1

  • memory/2036-28-0x0000000000A90000-0x0000000000ACE000-memory.dmp

    Filesize

    248KB

  • memory/2060-7-0x000000001B530000-0x000000001B812000-memory.dmp

    Filesize

    2.9MB

  • memory/2060-8-0x0000000001F00000-0x0000000001F08000-memory.dmp

    Filesize

    32KB

  • memory/2060-6-0x0000000002A00000-0x0000000002A80000-memory.dmp

    Filesize

    512KB

  • memory/2620-0-0x000007FEF5923000-0x000007FEF5924000-memory.dmp

    Filesize

    4KB

  • memory/2620-18-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/2620-1-0x0000000000380000-0x00000000003BE000-memory.dmp

    Filesize

    248KB

  • memory/2704-22-0x0000000001110000-0x000000000114E000-memory.dmp

    Filesize

    248KB

  • memory/2704-23-0x0000000000170000-0x000000000017E000-memory.dmp

    Filesize

    56KB

  • memory/2776-14-0x000000001B730000-0x000000001BA12000-memory.dmp

    Filesize

    2.9MB

  • memory/2776-15-0x0000000000650000-0x0000000000658000-memory.dmp

    Filesize

    32KB