Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
i4i5cWlPds5T4lU.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
i4i5cWlPds5T4lU.exe
Resource
win10v2004-20250217-en
General
-
Target
i4i5cWlPds5T4lU.exe
-
Size
2.4MB
-
MD5
6921656a8f1f24ab3b1a39c45b31ebc9
-
SHA1
54f97880caab512cac55201162b37a5e9d7f4ae6
-
SHA256
809e6e727c4ab324f36b55eebeaa3f0f77130c8bd2a0a11ec3c12e9e7a5345b8
-
SHA512
e251cfb31ff5ba0c224d22ffc13bc1f98872a450ec9fd404e064d6bf123d4378f8719130613f90a9609780fc28210cc7e8e1c32b9ab36e4a0142d36f7f70390a
-
SSDEEP
24576:d5/Jl2jvpMkjgWH7cFh3+Dg+Vj2G+92kNFycQZ1Pd/sZhnZaYxs12CG:67cP3+c+UN9H0lZ1tsXZje
Malware Config
Extracted
xworm
MrN0name-63570.portmap.host:63570
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1648-22838-0x0000000000400000-0x000000000041C000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\666999666 = "C:\\Users\\Public\\Documents\\i4i5cWlPds5T4lU.exe" i4i5cWlPds5T4lU.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 1648 2656 i4i5cWlPds5T4lU.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4i5cWlPds5T4lU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe 2656 i4i5cWlPds5T4lU.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 i4i5cWlPds5T4lU.exe Token: SeDebugPrivilege 1648 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31 PID 2656 wrote to memory of 1648 2656 i4i5cWlPds5T4lU.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\i4i5cWlPds5T4lU.exe"C:\Users\Admin\AppData\Local\Temp\i4i5cWlPds5T4lU.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648
-