Analysis

  • max time kernel
    131s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2025, 15:02

General

  • Target

    ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe

  • Size

    505KB

  • MD5

    6322038622ac996a0223263c05856334

  • SHA1

    7a7352d5cd674107fc5833dd2721166184a7f9e9

  • SHA256

    ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df

  • SHA512

    f6a66cc33bf5e1dc26e4d1453a31752085710feb086fe6c54085f96f80f0cf8fc631bffab0eea2477fcb5d0331960c7f9d16013e84efbaacd2dddc962935a47c

  • SSDEEP

    12288:lQAbZWUBjE8e3Pajq4fKIeKRcDD7hnGYpu2YpJTDT:l1bYUa8Esq6KACRUr9T

Malware Config

Extracted

Family

xworm

Version

3.1

C2

ezizanneyaw.duckdns.org:4266

Mutex

FiTlvrJ9jlda8Vht

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 5 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe
    "C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qaRRAFGceHfmko.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2724
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qaRRAFGceHfmko" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1E1B.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2412
    • C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe
      "C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp1E1B.tmp

    Filesize

    1KB

    MD5

    2ade83ab8ade187cd4fed547e51a8f6b

    SHA1

    61f70b1e82e8957fdb087c8cca6f87d9ec7f8844

    SHA256

    f9d61de6246269a89c590d7ec5ec25a0512ac7d7dc744892b1d77b3149ad1a4b

    SHA512

    e772e242fce5568402392d3bcbbc862c33c25b0cd0f4fc432028bd6c3fe376c8459fcf2af9e10bf9f7b356917cf1cb97dbf5c3ea5a3cb5b80550c5455246fa3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f795d39fc415ec48956b6e1d789fee38

    SHA1

    6f9f64ba18b14f1ee296b8701d1c547b68e4c76a

    SHA256

    52a582b1bdc8518c4c80f97eee65c8287f04be7b8a53464465c8ac33a6ca5669

    SHA512

    38ada482ebce3400f3b55e0f383f25840265c59b9fed8dcff4fd51c2386d45e95385619b242251d366a855904837e07342d4460cecd7054edcfddaf3a8ba9dee

  • C:\Users\Admin\AppData\Roaming\ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df.exe

    Filesize

    505KB

    MD5

    6322038622ac996a0223263c05856334

    SHA1

    7a7352d5cd674107fc5833dd2721166184a7f9e9

    SHA256

    ed5d0573850a7b710c7ee2250d0b1849bcbac27652482f302d9632b8cdab76df

    SHA512

    f6a66cc33bf5e1dc26e4d1453a31752085710feb086fe6c54085f96f80f0cf8fc631bffab0eea2477fcb5d0331960c7f9d16013e84efbaacd2dddc962935a47c

  • memory/1720-27-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1720-1-0x00000000013D0000-0x0000000001454000-memory.dmp

    Filesize

    528KB

  • memory/1720-2-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1720-3-0x00000000003B0000-0x00000000003CE000-memory.dmp

    Filesize

    120KB

  • memory/1720-4-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

    Filesize

    4KB

  • memory/1720-5-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1720-6-0x0000000000490000-0x00000000004E4000-memory.dmp

    Filesize

    336KB

  • memory/1720-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

    Filesize

    4KB

  • memory/3044-24-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-18-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-20-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-16-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3044-26-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-23-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-14-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB