Analysis

  • max time kernel
    122s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2025, 03:33

General

  • Target

    12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe

  • Size

    315KB

  • MD5

    e16acddcf30e48f1a412228269ec7ee0

  • SHA1

    c431b49d1a8c7154a90fff36f97ff28497d1e690

  • SHA256

    12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9

  • SHA512

    2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16

  • SSDEEP

    3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

185.7.214.108:4411

185.7.214.54:4411

aes.plain

Signatures

  • Detect Xworm Payload 7 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
    "C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\abvcuze0\abvcuze0.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5FFB.tmp" "c:\Users\Admin\AppData\Local\Temp\abvcuze0\CSC1F7361467CC94AEABB1C44738D35BFBC.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES5FFB.tmp

    Filesize

    1KB

    MD5

    0beac84b56732c05f399fe21b0fa71d7

    SHA1

    d31b870bbd0aeabc0ebc9e6150b08299da50628c

    SHA256

    2659b6af05a66ce22d752a1fb61e4169787383b3b81c4c3d109fe943c80a272e

    SHA512

    c51049c72ceb83600b6ee7adf0161441a637565332766f9dae2070ac2a184aa5e5fff1d4c0d0c8e5eb5c6e0320655a69ea60660de8b507a1b722138e9f8038a0

  • C:\Users\Admin\AppData\Local\Temp\abvcuze0\abvcuze0.dll

    Filesize

    41KB

    MD5

    1828fac02ea5f39cb1adc92b58599b1c

    SHA1

    a4b3e37a71893b71ee738b1fe1ecc5f589d7839b

    SHA256

    a14fd2889a2b347b0beb4b0bafb27d823facd4d3ce35a66733a794ce47276fa7

    SHA512

    9c27380491ff3fb28372446d64af6563598de809b113d823a8c1b5fb1a650088ec4311bacc1f4f23a27187c09054b84e4b1213c1b843e6685a7e1cf9e3784ede

  • \??\c:\Users\Admin\AppData\Local\Temp\abvcuze0\CSC1F7361467CC94AEABB1C44738D35BFBC.TMP

    Filesize

    652B

    MD5

    51aa2de4b6a00b2e63c639c265041aa9

    SHA1

    69d44ec3ba3cdc1883fba48f30037136bbdfe31e

    SHA256

    a8856dc958184d5facb7760945ede54e3d299897c20246e8151c80e368e19468

    SHA512

    3d83385fba9ef623117ff9d6270f7e1f7b576b358a8255e44fb2ec14dd7fd859fab575039b294ad2e1dfb6c24c93dc472e670eb1129154c957e24a8ffdd8f6d2

  • \??\c:\Users\Admin\AppData\Local\Temp\abvcuze0\abvcuze0.0.cs

    Filesize

    101KB

    MD5

    fcb83d623452e1cafbc3b0ad5b3b5b73

    SHA1

    abc26af231584f50ca2ae6de25d4c4764eaf7a9f

    SHA256

    d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc

    SHA512

    41a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8

  • \??\c:\Users\Admin\AppData\Local\Temp\abvcuze0\abvcuze0.cmdline

    Filesize

    204B

    MD5

    61647b1a085373552a1dd14f4bd70138

    SHA1

    44e63c1b846242ac2f4ed31c20af793d9154402a

    SHA256

    8ca5ac01431fe12b8ea48e421e5b6a1ab2b63f0ed8523308abaf01f5f2169b54

    SHA512

    64087a3ffb84d9a57e1b085afda938ec189aed9b5a4ee655e817445c1a3a8a3150acef0cc9b1367fc5006e65697c0eb936592b18a20075bf2cc79f4bad0c7169

  • memory/2280-32-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2280-5-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2280-1-0x0000000000A60000-0x0000000000AB4000-memory.dmp

    Filesize

    336KB

  • memory/2280-15-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2280-0-0x000000007442E000-0x000000007442F000-memory.dmp

    Filesize

    4KB

  • memory/2828-19-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-17-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-27-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-25-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-21-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-31-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-29-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-33-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2828-34-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2828-35-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2828-36-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB