Analysis

  • max time kernel
    93s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 03:42

General

  • Target

    12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe

  • Size

    315KB

  • MD5

    e16acddcf30e48f1a412228269ec7ee0

  • SHA1

    c431b49d1a8c7154a90fff36f97ff28497d1e690

  • SHA256

    12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9

  • SHA512

    2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16

  • SSDEEP

    3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

185.7.214.108:4411

185.7.214.54:4411

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
    "C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o5xbfway\o5xbfway.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE51.tmp" "c:\Users\Admin\AppData\Local\Temp\o5xbfway\CSC65D34AC69EAE4EAF948143B7CC95C71F.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2940
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:5100
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:2416
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1188

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESAE51.tmp

        Filesize

        1KB

        MD5

        2472f1b70fdda589eff658d3659bddb0

        SHA1

        d7097f5a45e3b24958aa7d27c3226a585bdcf738

        SHA256

        c6e09ce70311be28c389bcf4aa1dd2e929cb6d1cbec38520451520c5e35051bb

        SHA512

        aea1e716107f7c32d91d19c40fe66a6cc5cd2ad8c678bcfc0665eab2a295093e13c27ed47f5df049a4a89e237239dc16479837ee00b462a0e02476ace5ea5355

      • C:\Users\Admin\AppData\Local\Temp\o5xbfway\o5xbfway.dll

        Filesize

        41KB

        MD5

        12831141e767238385bfa9b7b0d1ca6d

        SHA1

        06693251dadcc0fc9d790a7de383081afe85b464

        SHA256

        b25b12d540882cae621fd8ba27417a0eaf4bd7e5d94775568ea18ab6b63437f9

        SHA512

        556d39f49aab7ae2d775243c509f72768f9d4107aa106251427e01a8d66dbbd30a43e3421150db0aaf7fa9b6f2cde2774aea3adc1d37b76f333c2e39d0f435f6

      • \??\c:\Users\Admin\AppData\Local\Temp\o5xbfway\CSC65D34AC69EAE4EAF948143B7CC95C71F.TMP

        Filesize

        652B

        MD5

        f1eb585e7a1c6c99b7bef0b1c838340a

        SHA1

        3701ac50d8b355a617a9f2126f562e5c9061c1a4

        SHA256

        4bcc20e65b6e0e165bed302afe763864e062d0d861022e38df5214088378ede4

        SHA512

        00953c512468e3dc4f8cc266dc5c9a12c0805b5d8956b00dad029bc3a508b4b89d300e9364a2cf0893f3df912581a19ee797c780f5aab55dc4de3d26fe7404c8

      • \??\c:\Users\Admin\AppData\Local\Temp\o5xbfway\o5xbfway.0.cs

        Filesize

        101KB

        MD5

        fcb83d623452e1cafbc3b0ad5b3b5b73

        SHA1

        abc26af231584f50ca2ae6de25d4c4764eaf7a9f

        SHA256

        d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc

        SHA512

        41a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8

      • \??\c:\Users\Admin\AppData\Local\Temp\o5xbfway\o5xbfway.cmdline

        Filesize

        204B

        MD5

        1f82fcd1d2e7cf9c7f28015df138f6b7

        SHA1

        cc4ddccc826300997766e755638e2981271ba28d

        SHA256

        1081cb6001d8b5a58eae78028e8369f79bf55e5b52970937ee99a42963b7972c

        SHA512

        3a2b89bbd0ef75543b9e49126f323899607e3c7cc93904517a265a8f9d85461a055287fc6150b552cb3f4b70e17d9d3f6be86a8c64b2bac27bfa762130331706

      • memory/1188-21-0x0000000005160000-0x00000000051FC000-memory.dmp

        Filesize

        624KB

      • memory/1188-24-0x0000000005790000-0x00000000057F6000-memory.dmp

        Filesize

        408KB

      • memory/1188-27-0x00000000067D0000-0x0000000006D74000-memory.dmp

        Filesize

        5.6MB

      • memory/1188-26-0x0000000006180000-0x0000000006212000-memory.dmp

        Filesize

        584KB

      • memory/1188-17-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/1188-25-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/1188-20-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/1188-23-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/1188-22-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/4908-0-0x000000007534E000-0x000000007534F000-memory.dmp

        Filesize

        4KB

      • memory/4908-5-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/4908-19-0x0000000075340000-0x0000000075AF0000-memory.dmp

        Filesize

        7.7MB

      • memory/4908-15-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/4908-1-0x0000000000880000-0x00000000008D4000-memory.dmp

        Filesize

        336KB