Analysis

  • max time kernel
    24s
  • max time network
    19s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 20:44

General

  • Target

    powercheat (1).exe

  • Size

    29.4MB

  • MD5

    1812c9c8e1275450891c680c8cbb8dc9

  • SHA1

    be5d134a0931fa4e72b65c107b044c95b6deb52e

  • SHA256

    0cfc1a3806f651fb1f17ad1acd0cc406c3ffc7f0c12e698bb8c98878158d7dfb

  • SHA512

    19e5caca9bde72e0e2fb97968052cdbe7d0849d0fae11c2dc849c8da690b2442735edd8627c64da0b68f10db934b03ca8e4055f5e373d6fc07b0d0adb5d2c4ef

  • SSDEEP

    786432:h1/hzuWNxn5ZXCRcNFzCspP3CiOlg6w2br4Ao9lXTjEl1o0rOU:NuWNx5ZSR+R53CiOlg6Zbr4vzjRI

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:62949

pidoras123131-62949.portmap.host:62949

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7812594920:AAF8LiE_BAgLbrCBoONka4W_igE0Wo_lUEg/sendMessage?chat_id=7101392896

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
    "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5540
    • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
      "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:708
    • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
      "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
        "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
      • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
        "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
          "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:5064
        • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
          "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
            "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
          • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
            "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4956
            • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
              "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:5520
            • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
              "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3084
              • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
                "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:544
              • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
                "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2044
                • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
                  "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5128
                • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
                  "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1884
                  • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
                    "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3592
                  • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
                    "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5448
                    • C:\Users\Admin\AppData\Local\Temp\хуйло.exe
                      "C:\Users\Admin\AppData\Local\Temp\хуйло.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2228
                    • C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe
                      "C:\Users\Admin\AppData\Local\Temp\powercheat (1).exe"
                      10⤵
                        PID:6048
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\CheacherCheats1
      1⤵
        PID:5516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powercheat (1).exe.log

        Filesize

        654B

        MD5

        2cbbb74b7da1f720b48ed31085cbd5b8

        SHA1

        79caa9a3ea8abe1b9c4326c3633da64a5f724964

        SHA256

        e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

        SHA512

        ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

      • C:\Users\Admin\AppData\Local\Temp\хуйло.exe

        Filesize

        142KB

        MD5

        c4993bc05fff4c6dad5ca8f6a5c4d52e

        SHA1

        2eeb240fda801478a0c5d67d57efedc94652eda8

        SHA256

        2da85c1b6454943af17f82108a5e58832b23c010cb2857bf5a4ddbe6d062a81a

        SHA512

        15772d4f4b9cb221782cf06be592ebc72143ffe62aa7b579828596b75fb99919ab0011e5e5b19d93acdd3ea6837cdfd6650d36fd914d67a6b5715046f94b006a

      • memory/708-25-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/708-33-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/708-30-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/708-14-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/708-15-0x0000000000B20000-0x0000000000B4A000-memory.dmp

        Filesize

        168KB

      • memory/2980-21-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/2980-19-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/5540-0-0x00007FF9342D3000-0x00007FF9342D5000-memory.dmp

        Filesize

        8KB

      • memory/5540-18-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/5540-11-0x00007FF9342D0000-0x00007FF934D92000-memory.dmp

        Filesize

        10.8MB

      • memory/5540-1-0x0000000000360000-0x00000000020C8000-memory.dmp

        Filesize

        29.4MB