General
-
Target
Security.msi
-
Size
444KB
-
Sample
250331-smb9hsswbz
-
MD5
2a483b7d8f9f70e6abb6a6b5193bfdbf
-
SHA1
10ce8a8d4ef944ba2ff5d101c9c34a597012f182
-
SHA256
f9b1b482d5eaf4ae4892fe8a5af1e66f5ace1f3f582e1638b68494867b326521
-
SHA512
733ec6b41f7d98f5df6a33c3cb2eed93df846a3c2ed8082d073277a3d7e1b54d75c091bc57f48958265d57caec0e292075218277b85a1601f22584e9179748e3
-
SSDEEP
12288:8tVRQ+gjpjegDro86la3QNTcw2gWOj36:8t9cpVDh6WQNYxz
Static task
static1
Behavioral task
behavioral1
Sample
Security.msi
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
3.1
respect-hits.gl.at.ply.gg:53989
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Security.msi
-
Size
444KB
-
MD5
2a483b7d8f9f70e6abb6a6b5193bfdbf
-
SHA1
10ce8a8d4ef944ba2ff5d101c9c34a597012f182
-
SHA256
f9b1b482d5eaf4ae4892fe8a5af1e66f5ace1f3f582e1638b68494867b326521
-
SHA512
733ec6b41f7d98f5df6a33c3cb2eed93df846a3c2ed8082d073277a3d7e1b54d75c091bc57f48958265d57caec0e292075218277b85a1601f22584e9179748e3
-
SSDEEP
12288:8tVRQ+gjpjegDro86la3QNTcw2gWOj36:8t9cpVDh6WQNYxz
-
Detect Xworm Payload
-
Xworm family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1