General

  • Target

    Silence.exe

  • Size

    28.0MB

  • Sample

    240701-mhrwhswdph

  • MD5

    831c276bc5317698e3b81b4d7d06c61a

  • SHA1

    2872c2fdd594a9578926daaff27640f4f042b17c

  • SHA256

    12434745d5d33a4f44eef61c75681776af4719fc1f965e0a136f7e8f56d847d9

  • SHA512

    c3292991b61775584bbefdfdb120086eb303486c45fc53d2fcd80a64cbc6ecaccb8a2b8fe2c1178f7dacdc3cf72290512a6037b2e47887967c1f129a6db5fbf7

  • SSDEEP

    786432:sKNT2Hyh7hC/4Ubv8bNraTdqn1yU0tLdbJ9bCkv:yHyhUQJmqn1y7xbT

Malware Config

Extracted

Family

xworm

C2

https://pastebin.com/raw/Xnd0E962:9090

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    SVCService.exe

  • pastebin_url

    https://pastebin.com/raw/Xnd0E962

Targets

    • Target

      Silence.exe

    • Size

      28.0MB

    • MD5

      831c276bc5317698e3b81b4d7d06c61a

    • SHA1

      2872c2fdd594a9578926daaff27640f4f042b17c

    • SHA256

      12434745d5d33a4f44eef61c75681776af4719fc1f965e0a136f7e8f56d847d9

    • SHA512

      c3292991b61775584bbefdfdb120086eb303486c45fc53d2fcd80a64cbc6ecaccb8a2b8fe2c1178f7dacdc3cf72290512a6037b2e47887967c1f129a6db5fbf7

    • SSDEEP

      786432:sKNT2Hyh7hC/4Ubv8bNraTdqn1yU0tLdbJ9bCkv:yHyhUQJmqn1y7xbT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks