Resubmissions
01-07-2024 05:42
240701-gd99ea1clq 10Analysis
-
max time kernel
18s -
max time network
22s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 05:42
Behavioral task
behavioral1
Sample
Xworm-V5.6/RES/XWorm.Resources.vbs
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
Xworm-V5.6/XWorm V5.6.exe
Resource
win11-20240508-en
General
-
Target
Xworm-V5.6/XWorm V5.6.exe
-
Size
13.1MB
-
MD5
5db4c8e052f3454e0f6ba19ee175f578
-
SHA1
32a727273944af1fb07634735ba75f0a017f7d58
-
SHA256
7efddbf0825853ea834ce3c763fa9828aa72cb4844e8a98c4b79eb832a138a0b
-
SHA512
0d1aa64daf4abb3f895c79c6c4deb6ffc91321fc597a96269ff621bb29376e2fed240dabe6f925c0063acbb794a686572d199cdcf35d70704a2b6c0bb5e428c7
-
SSDEEP
196608:6S/BAe1d4ihvy85JhhYc3BSL1kehn4inje:6MyIhhkRka4i
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3400-2-0x000001DB7A4C0000-0x000001DB7A6B4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
XWorm V5.6.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWorm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
XWorm V5.6.exepid process 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe 3400 XWorm V5.6.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
XWorm V5.6.exepid process 3400 XWorm V5.6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
XWorm V5.6.exepid process 3400 XWorm V5.6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xworm-V5.6\XWorm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\Xworm-V5.6\XWorm V5.6.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004C81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3400-0-0x00007FFF4A593000-0x00007FFF4A595000-memory.dmpFilesize
8KB
-
memory/3400-1-0x000001DB5ED80000-0x000001DB5FAAA000-memory.dmpFilesize
13.2MB
-
memory/3400-2-0x000001DB7A4C0000-0x000001DB7A6B4000-memory.dmpFilesize
2.0MB
-
memory/3400-3-0x00007FFF4A590000-0x00007FFF4B052000-memory.dmpFilesize
10.8MB
-
memory/3400-4-0x00007FFF4A590000-0x00007FFF4B052000-memory.dmpFilesize
10.8MB
-
memory/3400-5-0x00007FFF4A590000-0x00007FFF4B052000-memory.dmpFilesize
10.8MB
-
memory/3400-6-0x00007FFF4A590000-0x00007FFF4B052000-memory.dmpFilesize
10.8MB
-
memory/3400-7-0x00007FFF4A593000-0x00007FFF4A595000-memory.dmpFilesize
8KB
-
memory/3400-8-0x00007FFF4A590000-0x00007FFF4B052000-memory.dmpFilesize
10.8MB
-
memory/3400-12-0x000001DB03920000-0x000001DB0393E000-memory.dmpFilesize
120KB
-
memory/3400-13-0x000001DB03940000-0x000001DB0394B000-memory.dmpFilesize
44KB
-
memory/3400-9-0x000001DB03890000-0x000001DB038D6000-memory.dmpFilesize
280KB
-
memory/3400-11-0x000001DB03910000-0x000001DB0391D000-memory.dmpFilesize
52KB
-
memory/3400-10-0x000001DB038E0000-0x000001DB038E9000-memory.dmpFilesize
36KB