Analysis

  • max time kernel
    30s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe

  • Size

    3.7MB

  • MD5

    9fca2a5278edc3a95d546f0ae7f3cbff

  • SHA1

    c97159bcbf621e7b9374472ed53a4dd963f75cf7

  • SHA256

    4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae

  • SHA512

    447deeb5021f15c46ca4eb70cc46065d3bd041afde860dfa2a7b9a7fbd9c4640712ad4c221f220015d28251780e124ea0bc9a548f97e822946eafffe8169f211

  • SSDEEP

    98304:AkSzpYRKKe/I765KN6fXVwfbC6gz5IfMTJInd:GPKeC65U69wfxUTa

Score
10/10

Malware Config

Extracted

Family

xworm

C2

expected-sega.gl.at.ply.gg:4730

chat-poster.gl.at.ply.gg:41534

193.161.193.99:21764

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
    "C:\Users\Admin\AppData\Local\Temp\4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Users\Admin\AppData\Roaming\BootStrapper(1).exe
      "C:\Users\Admin\AppData\Roaming\BootStrapper(1).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Roaming\BootStrapper.exe
        "C:\Users\Admin\AppData\Roaming\BootStrapper.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
      • C:\Users\Admin\AppData\Roaming\SolaraExecutor(1).exe
        "C:\Users\Admin\AppData\Roaming\SolaraExecutor(1).exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Users\Admin\AppData\Roaming\SolaraSupport.exe
          "C:\Users\Admin\AppData\Roaming\SolaraSupport.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Users\Admin\AppData\Roaming\BootstrapperNew.exe
          "C:\Users\Admin\AppData\Roaming\BootstrapperNew.exe"
          4⤵
          • Executes dropped EXE
          PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\BootStrapper(1).exe

    Filesize

    3.6MB

    MD5

    81fa80bed6f2f08ba07e9b06090df70e

    SHA1

    2df20de5a0ff2ea48159592a9ce4477998df32c3

    SHA256

    b365693f6cd3af2b86cf10839a5d098a5d081344bb0ad89211a2845991b43b7c

    SHA512

    7f2d2e6ad87d4e75083bc22cdc0eb5b6633a04b2fb8201f0c8bf9c5dec9a98d5734fae0da397d9448d14936ead20eea55d3587dbee765f418953578973a99edd

  • C:\Users\Admin\AppData\Roaming\BootStrapper.exe

    Filesize

    92KB

    MD5

    f3bc54ff38ea22dd33c72d9e054c47e2

    SHA1

    f5298333bb813c1ae4b4bcea9e2850d9ff3e2ba0

    SHA256

    2bbe176ba629ad6f1d2a14b2d545ad6467f8394095fbcae58ff063c93510d45d

    SHA512

    ee0ad86298b8aeeaec86689c83ee31de656e4eef1fd5c07d073e02382e6e2bcefce7153134293217922d814340f2835bc4fe20931fdb73949bc3ef10ffb5f0f0

  • C:\Users\Admin\AppData\Roaming\SolaraExecutor(1).exe

    Filesize

    3.5MB

    MD5

    ef9423e6d9a4040436177ca7b910a099

    SHA1

    0b04c65721e560f946c07dfb242ec312b9e303bc

    SHA256

    a7b00def0da39ce6cf45cb072e82ead00f9affa99710313276cff335afdfcef3

    SHA512

    11d17c27dfa7c773cff903ee7f220c1ba7cf76fe5caef77e14937f7fde5a972536f5ba99d48e3c8beb2a200e31dc13190d3101fe1d903268e347425a898bb5f1

  • C:\Users\Admin\AppData\Roaming\SolaraSupport.exe

    Filesize

    59KB

    MD5

    472fe7fe7163333db68640dc7827bc17

    SHA1

    35a127ed3c08379dd270761547f209bb56d6b9e8

    SHA256

    08da7551995bad095ca9e22ad11264e565a023caf9ef799f298f4c235ec44d26

    SHA512

    deeb4d4cc2234475ee6b0d21a259a91e38f8317324f4c2f68497e9081bdd87dd59c9f1cb89e2ef0cdb4c063ef5be95e6afd6aad9c63cf199c631533528aba006

  • C:\Users\Admin\AppData\Roaming\XClient.exe

    Filesize

    91KB

    MD5

    32d4957922b7bd2d0a9c5a8218092787

    SHA1

    46d915d80472d970e5276650879c373d6cd2ed09

    SHA256

    aa82d5e314e7a13d4b038ee9359ec996028371fd3eb38bccff5ced6afe548663

    SHA512

    782ae2b2cd8390a5bc884ee534f43eb032a8715fba00edd843bbab8f3d12a0c478e7e1cfb66ef455a54522e825c31000a63c988fd2043f443d15575158e831f4

  • \Users\Admin\AppData\Roaming\BootstrapperNew.exe

    Filesize

    3.4MB

    MD5

    37d3fcd5058c45d2c2bba065a5c22296

    SHA1

    22debc7d8cdf3efd9b65ad099592c68ad7fa2713

    SHA256

    774cc2deb69d990bb908b5b4a77314e474b357268dad92d917dcd85176f43ffd

    SHA512

    fcad1f64c733180c7812a673379a35e488ed3306ca6146b187c7627a670012cec2a9166bf88815fbc1468cb70e7a1215a54e34aab37cba0f4ded8ce914323bdc

  • memory/1656-32-0x0000000000A10000-0x0000000000A26000-memory.dmp

    Filesize

    88KB

  • memory/2096-1-0x0000000000D70000-0x000000000112A000-memory.dmp

    Filesize

    3.7MB

  • memory/2096-0-0x000007FEF6183000-0x000007FEF6184000-memory.dmp

    Filesize

    4KB

  • memory/2444-13-0x00000000011E0000-0x0000000001580000-memory.dmp

    Filesize

    3.6MB

  • memory/2804-7-0x0000000000FE0000-0x0000000000FFC000-memory.dmp

    Filesize

    112KB

  • memory/2804-54-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2804-55-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2804-16-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2804-40-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-39-0x0000000000D60000-0x00000000010D0000-memory.dmp

    Filesize

    3.4MB

  • memory/2956-49-0x0000000000D30000-0x0000000000D46000-memory.dmp

    Filesize

    88KB

  • memory/2956-41-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/2956-43-0x0000000000570000-0x0000000000580000-memory.dmp

    Filesize

    64KB

  • memory/2956-45-0x000000001DDB0000-0x000000001DEB0000-memory.dmp

    Filesize

    1024KB

  • memory/2956-47-0x00000000009D0000-0x00000000009F6000-memory.dmp

    Filesize

    152KB

  • memory/2956-48-0x0000000000C90000-0x0000000000C98000-memory.dmp

    Filesize

    32KB

  • memory/2956-42-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/2956-50-0x0000000000C80000-0x0000000000C8A000-memory.dmp

    Filesize

    40KB

  • memory/2956-46-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2956-51-0x00000000009B0000-0x00000000009BA000-memory.dmp

    Filesize

    40KB

  • memory/2956-52-0x0000000000CA0000-0x0000000000CA8000-memory.dmp

    Filesize

    32KB

  • memory/2956-56-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/3000-20-0x0000000000CB0000-0x0000000000CCC000-memory.dmp

    Filesize

    112KB

  • memory/3004-26-0x00000000012C0000-0x0000000001644000-memory.dmp

    Filesize

    3.5MB