Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
i4i5cWlPds5T4lU.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
i4i5cWlPds5T4lU.exe
Resource
win10v2004-20250217-en
General
-
Target
i4i5cWlPds5T4lU.exe
-
Size
2.4MB
-
MD5
6921656a8f1f24ab3b1a39c45b31ebc9
-
SHA1
54f97880caab512cac55201162b37a5e9d7f4ae6
-
SHA256
809e6e727c4ab324f36b55eebeaa3f0f77130c8bd2a0a11ec3c12e9e7a5345b8
-
SHA512
e251cfb31ff5ba0c224d22ffc13bc1f98872a450ec9fd404e064d6bf123d4378f8719130613f90a9609780fc28210cc7e8e1c32b9ab36e4a0142d36f7f70390a
-
SSDEEP
24576:d5/Jl2jvpMkjgWH7cFh3+Dg+Vj2G+92kNFycQZ1Pd/sZhnZaYxs12CG:67cP3+c+UN9H0lZ1tsXZje
Malware Config
Extracted
xworm
MrN0name-63570.portmap.host:63570
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4956-22829-0x0000000000400000-0x000000000041C000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\666999666 = "C:\\Users\\Admin\\AppData\\Roaming\\i4i5cWlPds5T4lU.exe" i4i5cWlPds5T4lU.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 4956 1384 i4i5cWlPds5T4lU.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 440 4956 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4i5cWlPds5T4lU.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe 1384 i4i5cWlPds5T4lU.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1384 i4i5cWlPds5T4lU.exe Token: SeDebugPrivilege 4956 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97 PID 1384 wrote to memory of 4956 1384 i4i5cWlPds5T4lU.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\i4i5cWlPds5T4lU.exe"C:\Users\Admin\AppData\Local\Temp\i4i5cWlPds5T4lU.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 17563⤵
- Program crash
PID:440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4956 -ip 49561⤵PID:2224