Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
XWormV1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWormV1.exe
Resource
win10v2004-20250314-en
General
-
Target
XWormV1.exe
-
Size
24.2MB
-
MD5
bc5fc4fd462fe1ec684c0c3c3a3de207
-
SHA1
313f3016ac5a1d33119982840720686e1fc15f8d
-
SHA256
31953c0ae524543f4b060884679afd72809f2aaa11eeee8f65784da34743a752
-
SHA512
31c282d8921ebf2f0934bc3d3197b9e335cb4589dcf617d75611dcd9d5b83bee6a9ed85a3a8e3407066500acc2a63d34ccbd2488a4dd1977dc8ce1d297a3fb55
-
SSDEEP
393216:vA/nTrrqc1NTlXs515TosgE9AASto57QBLuRzEqtn9dbmM6Z1u3I2ZL4:v+nTLvXsf5TxRzWolTtn99z6ZsI254
Malware Config
Extracted
xworm
127.0.0.1:5444
away-operates.gl.at.ply.gg:5444
middle-regards.gl.at.ply.gg:5444
127.0.0.1:38506
away-operates.gl.at.ply.gg:38506
-
Install_directory
%Temp%
-
install_file
windows.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x0008000000024297-6.dat family_xworm behavioral2/memory/332-13-0x00000000001D0000-0x00000000001EA000-memory.dmp family_xworm behavioral2/files/0x0007000000024299-33.dat family_xworm behavioral2/memory/6064-42-0x00000000004C0000-0x00000000004D8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2308 powershell.exe 4956 powershell.exe 3936 powershell.exe 2516 powershell.exe 5836 powershell.exe 4788 powershell.exe 5140 powershell.exe 1888 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation XWorm V3.0.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 3tb.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation XWormV1.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk windows.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c.lnk 3tb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c.lnk 3tb.exe -
Executes dropped EXE 9 IoCs
pid Process 332 windows.exe 4504 XWorm V3.0.exe 6064 3tb.exe 3200 windows.exe 5508 c.exe 5424 windows.exe 5756 c.exe 5652 windows.exe 5080 c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c.exe" 3tb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5760 schtasks.exe 2628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4788 powershell.exe 4788 powershell.exe 5140 powershell.exe 5140 powershell.exe 1888 powershell.exe 1888 powershell.exe 2308 powershell.exe 2308 powershell.exe 4956 powershell.exe 4956 powershell.exe 332 windows.exe 3936 powershell.exe 3936 powershell.exe 2516 powershell.exe 2516 powershell.exe 5836 powershell.exe 5836 powershell.exe 6064 3tb.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 332 windows.exe Token: SeDebugPrivilege 6064 3tb.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 5140 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 332 windows.exe Token: SeDebugPrivilege 3200 windows.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 5836 powershell.exe Token: SeDebugPrivilege 6064 3tb.exe Token: SeDebugPrivilege 5508 c.exe Token: SeDebugPrivilege 5424 windows.exe Token: SeDebugPrivilege 5756 c.exe Token: SeDebugPrivilege 5652 windows.exe Token: SeDebugPrivilege 5080 c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 332 windows.exe 6064 3tb.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4168 wrote to memory of 332 4168 XWormV1.exe 88 PID 4168 wrote to memory of 332 4168 XWormV1.exe 88 PID 4168 wrote to memory of 4504 4168 XWormV1.exe 89 PID 4168 wrote to memory of 4504 4168 XWormV1.exe 89 PID 4504 wrote to memory of 6064 4504 XWorm V3.0.exe 90 PID 4504 wrote to memory of 6064 4504 XWorm V3.0.exe 90 PID 332 wrote to memory of 4788 332 windows.exe 91 PID 332 wrote to memory of 4788 332 windows.exe 91 PID 332 wrote to memory of 5140 332 windows.exe 93 PID 332 wrote to memory of 5140 332 windows.exe 93 PID 332 wrote to memory of 1888 332 windows.exe 95 PID 332 wrote to memory of 1888 332 windows.exe 95 PID 332 wrote to memory of 2308 332 windows.exe 97 PID 332 wrote to memory of 2308 332 windows.exe 97 PID 6064 wrote to memory of 4956 6064 3tb.exe 99 PID 6064 wrote to memory of 4956 6064 3tb.exe 99 PID 332 wrote to memory of 5760 332 windows.exe 101 PID 332 wrote to memory of 5760 332 windows.exe 101 PID 3504 wrote to memory of 3200 3504 cmd.exe 105 PID 3504 wrote to memory of 3200 3504 cmd.exe 105 PID 6064 wrote to memory of 3936 6064 3tb.exe 106 PID 6064 wrote to memory of 3936 6064 3tb.exe 106 PID 6064 wrote to memory of 2516 6064 3tb.exe 108 PID 6064 wrote to memory of 2516 6064 3tb.exe 108 PID 6064 wrote to memory of 5836 6064 3tb.exe 110 PID 6064 wrote to memory of 5836 6064 3tb.exe 110 PID 6064 wrote to memory of 2628 6064 3tb.exe 112 PID 6064 wrote to memory of 2628 6064 3tb.exe 112 PID 3904 wrote to memory of 5508 3904 cmd.exe 116 PID 3904 wrote to memory of 5508 3904 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWormV1.exe"C:\Users\Admin\AppData\Local\Temp\XWormV1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "windows" /tr "C:\Users\Admin\AppData\Local\Temp\windows.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V3.0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\3tb.exe"C:\Users\Admin\AppData\Local\Temp\3tb.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3tb.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '3tb.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\c.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'c.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "c" /tr "C:\Users\Admin\AppData\Local\Temp\c.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\windows.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\windows.exeC:\Users\Admin\AppData\Local\Temp\windows.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\c.exeC:\Users\Admin\AppData\Local\Temp\c.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\windows.exeC:\Users\Admin\AppData\Local\Temp\windows.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
C:\Users\Admin\AppData\Local\Temp\c.exeC:\Users\Admin\AppData\Local\Temp\c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
C:\Users\Admin\AppData\Local\Temp\windows.exeC:\Users\Admin\AppData\Local\Temp\windows.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5652
-
C:\Users\Admin\AppData\Local\Temp\c.exeC:\Users\Admin\AppData\Local\Temp\c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5080
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD5cae60f0ddddac635da71bba775a2c5b4
SHA1386f1a036af61345a7d303d45f5230e2df817477
SHA256b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16
SHA51228ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253
-
Filesize
944B
MD5a1a5cd54a073fcc6f996c5bf8eae9ab4
SHA1f51b3b1fe5ec1ace8641c99d2769a0f9f93f640f
SHA256d0cc04ed0b546b1d7f405da38b5c1addd1fbc26591027e76b9745a9c1daf584e
SHA5126804bc8a338f7727396b107ee58e418dae2c086aa85c8edb4d4a90f7398963dc63bab06574ed8b3c593e76d7740ecacec63d1643c6f26058a5d947caafb7673c
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
944B
MD517400c82fd4488eb713339754b4253ea
SHA1b8b34c64ac58017f8299adef40d509ffcd40819b
SHA2569673f105169ed443b651abe6c73902d3e2cee6919f293f772dae764eda56f917
SHA512d0290e9d36855c4eb50494faae0061457e632f14a481b52d9679d43d5d946e969c90f1845f6e4457774e895487a75d53bb45053baa55c8b1e39d9be6f392f414
-
Filesize
944B
MD531a287524525945b2b7252bd7d4b9fbe
SHA13064cff52c91b160cca9c704e64e815535c8d765
SHA25651503d597e05ef2e1f0d5d7d55a53716c16efdd399e5912dfbe97e2be68f92b2
SHA5125b7b13fa99a0fdac9ea736618e9ae783db9f4c0194047f3025bb8392f349bda9421af345392ef6daaa5b9851d7e770d085762e1afb6336269ce48cd10af27357
-
Filesize
71KB
MD5d339041a29a574dda9caca8ec4579a2b
SHA1449d902891497caa2b7e74b0041af78f19b92849
SHA2565389fb6c78fa44247f1e8d44705823eeffd672ef90bbdbb20046bb35457bc8f9
SHA512feeacb60e92d7a63ee2183676c7a94f3f4a45cd21963245a2bf81b204f7525381a3a08b1ef9bc13f9863e5f5345a0d4f90f0f28ba7cd427643fe967898315af3
-
Filesize
24.0MB
MD5bcb183cda7b24b4552af3a996fcb2ec1
SHA1d5bda4fb01523726db74a4e3aed4b96856133f55
SHA256e37acff6208eab03f36637858b85829b4d808846b54255470989d15975e1649e
SHA512b03819f50e465d30189732874ecaf94a2f489d3df3e1a91f04ffb7261171a9909ad248f988b6f193b5d44571239132aecf8436ef480cf3448ec6c7afb6857ed3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
80KB
MD5037291fab927f4d5bb6e9e981209736c
SHA1966de581ea43b6d4a5cebd8c5eab45d48ced3403
SHA256cca9480890c3c867a76a23d730d2340360a5a0541a3a77fea1c216c5a779a434
SHA51237353cb80de0426b0f5c6689f962cf06b679bbbed1aae443f5168aab489e4da4e983ba5f473e8d0151863981bce61f957ebc3df4294437624d0b26377a9683b5