Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 05:21

General

  • Target

    Files/1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74.exe

  • Size

    2.5MB

  • MD5

    a6506ab7846f51acccb092a6164c7677

  • SHA1

    12a675e6434764b98335440220864bdffeb6cbfc

  • SHA256

    1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74

  • SHA512

    44d5c49b54011fed4332ab08375031543108b286a21768b35bd8bfab02cdb413b53cc1bc8e98c554008e9ca9d4ca9a92c03beab01db9a40e87908054b3dd9612

  • SSDEEP

    49152:ZZPjorfOAfRxx13BIq8IYpSqxN7XGQKoBaJ3RIrMQJZipKE1:ZZkzD73i7pSqxNV5wQJwd1

Score
10/10

Malware Config

Extracted

Family

xworm

C2

remember-gene.gl.at.ply.gg:9389

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Files\1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74.exe
    "C:\Users\Admin\AppData\Local\Temp\Files\1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
      2⤵
      • Executes dropped EXE
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\roblox.exe
      "C:\Users\Admin\AppData\Local\Temp\roblox.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\roblox.exe

    Filesize

    67KB

    MD5

    164ce479a8e750ae7f9ed94bf1a9dd70

    SHA1

    4365d349f9bba19c6568b1a7db444435c8f2a472

    SHA256

    4dc4aa3db5cc5989c820289038614e287dd347fbd6b64c697c89e6d52042c465

    SHA512

    a2670563ba3db3e3c55152abfb4f703f13ab71f2a0c449d5e0c774218f76d76bb6f3a226f8be0f1790e284f59f9ea99bcc30c41e99455284010f317078b3600b

  • \Users\Admin\AppData\Local\Temp\BootstrapperNew.exe

    Filesize

    2.9MB

    MD5

    f227cdfd423b3cc03bb69c49babf4da3

    SHA1

    3db5a97d9b0f2545e7ba97026af6c28512200441

    SHA256

    cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

    SHA512

    b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

  • memory/1996-17-0x000007FEF5810000-0x000007FEF61FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1996-1-0x0000000000C90000-0x0000000000F12000-memory.dmp

    Filesize

    2.5MB

  • memory/1996-3-0x000007FEF5810000-0x000007FEF61FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1996-0-0x000007FEF5813000-0x000007FEF5814000-memory.dmp

    Filesize

    4KB

  • memory/2200-18-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB

  • memory/2200-23-0x0000000002550000-0x000000000255A000-memory.dmp

    Filesize

    40KB

  • memory/2200-32-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB

  • memory/2200-19-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB

  • memory/2200-11-0x000007FEF5810000-0x000007FEF61FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-20-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/2200-22-0x000000001E730000-0x000000001E830000-memory.dmp

    Filesize

    1024KB

  • memory/2200-15-0x0000000000AB0000-0x0000000000D92000-memory.dmp

    Filesize

    2.9MB

  • memory/2200-24-0x0000000002560000-0x0000000002586000-memory.dmp

    Filesize

    152KB

  • memory/2200-25-0x00000000025A0000-0x00000000025A8000-memory.dmp

    Filesize

    32KB

  • memory/2200-26-0x00000000027D0000-0x00000000027E6000-memory.dmp

    Filesize

    88KB

  • memory/2200-27-0x0000000002590000-0x000000000259A000-memory.dmp

    Filesize

    40KB

  • memory/2200-28-0x0000000002540000-0x000000000254A000-memory.dmp

    Filesize

    40KB

  • memory/2200-29-0x0000000002740000-0x0000000002748000-memory.dmp

    Filesize

    32KB

  • memory/2200-31-0x000007FEF5810000-0x000007FEF61FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2208-16-0x0000000000CB0000-0x0000000000CC8000-memory.dmp

    Filesize

    96KB