Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 05:46
Behavioral task
behavioral1
Sample
XCliefghfghfghnt.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XCliefghfghfghnt.exe
Resource
win10v2004-20240419-en
General
-
Target
XCliefghfghfghnt.exe
-
Size
40KB
-
MD5
c0f78a4a36fe6b44cfbee7d9a9fb9510
-
SHA1
4455ca2f580196c82e10eade60ace724bdc0b5bc
-
SHA256
95494d2739b808181796b13c85f7c6327a41d530f8701f03b924daf1b497e1c3
-
SHA512
5b434ff58d2f404e9df43e8fa2708a9b90c237046c870db87f419d1b726a5946d60321ba02ae69449b1c6cfdc00df317fdb9bd93fd1c3d99a8a9d847159b3186
-
SSDEEP
768:k55XvtTKnCVrAmJRXFuO5tF5PT95OBOMhT3Ev:kMCdAmJ1FuOLFx95SOM9g
Malware Config
Extracted
xworm
5.0
127.0.0.1:38630
147.185.221.19:38630
bay-currencies.gl.at.ply.gg:38630
and-organized.gl.at.ply.gg:38630
community-excess.gl.at.ply.gg:38630
fTpGRWnrShtm0zhA
-
Install_directory
%AppData%
-
install_file
runbroker.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-0-0x0000000000090000-0x00000000000A0000-memory.dmp family_xworm -
Drops startup file 2 IoCs
Processes:
XCliefghfghfghnt.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runbroker.lnk XCliefghfghfghnt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runbroker.lnk XCliefghfghfghnt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
XCliefghfghfghnt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\runbroker = "C:\\Users\\Admin\\AppData\\Roaming\\runbroker.exe" XCliefghfghfghnt.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
XCliefghfghfghnt.exepid process 1692 XCliefghfghfghnt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
XCliefghfghfghnt.exedescription pid process Token: SeDebugPrivilege 1692 XCliefghfghfghnt.exe Token: SeDebugPrivilege 1692 XCliefghfghfghnt.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
XCliefghfghfghnt.exepid process 1692 XCliefghfghfghnt.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1692-0-0x0000000000090000-0x00000000000A0000-memory.dmpFilesize
64KB
-
memory/1692-1-0x000007FEF5680000-0x000007FEF606C000-memory.dmpFilesize
9.9MB
-
memory/1692-2-0x000000001ADD0000-0x000000001AE50000-memory.dmpFilesize
512KB
-
memory/1692-7-0x000007FEF5680000-0x000007FEF606C000-memory.dmpFilesize
9.9MB
-
memory/1692-8-0x000000001ADD0000-0x000000001AE50000-memory.dmpFilesize
512KB