Resubmissions

03-05-2024 17:26

240503-vz54gaef96 10

03-05-2024 17:25

240503-vy9p9sef75 10

03-05-2024 17:19

240503-vvvryaef24 10

03-05-2024 17:17

240503-vt5krabf8x 10

03-05-2024 17:11

240503-vqjtwabf2t 10

Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-05-2024 17:26

General

  • Target

    54335453425234.exe

  • Size

    57KB

  • MD5

    3db6691099ca8a85cb08e68dc8eed38a

  • SHA1

    9592497a91fd06c82e0082c61ebff8688b4932dc

  • SHA256

    002a55a722eb437d66039df4b8e16b32baa59ba4f3a180c0d5a0514e01dc7377

  • SHA512

    ba0778c135da545a10cfeea230263493d2339e19b61d2a9a2db93f805a620a79381c2d6be82ee1ff199b4bb490013e624b2d68e937966615c6ea64a67c6cb60e

  • SSDEEP

    1536:JiNNpIaOeW6fBnwL36ZOR8Rngkb/kiqnLx3oXyDmOJHLFu/:MNNpzW6fBwL6/gkb/O6lOJk/

Malware Config

Extracted

Family

xworm

C2

0.tcp.eu.ngrok.io:15487

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 1 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • ModiLoader Second Stage 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54335453425234.exe
    "C:\Users\Admin\AppData\Local\Temp\54335453425234.exe"
    1⤵
    • UAC bypass
    • Drops startup file
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\dhylty.exe
      "C:\Users\Admin\AppData\Local\Temp\dhylty.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4300
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\fqsxpf.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2268
    • C:\Windows\System32\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall set allprofiles state off
      2⤵
      • Modifies Windows Firewall
      PID:4400
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" stop wuauserv
      2⤵
      • Launches sc.exe
      PID:3188
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wuauserv start=disabled
      2⤵
      • Launches sc.exe
      PID:4700
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\TraceSuspend.bat" "
    1⤵
      PID:1752
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4900
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:4856
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1684
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:1104

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      System Services

      1
      T1569

      Service Execution

      1
      T1569.002

      Persistence

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Privilege Escalation

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Defense Evasion

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Impair Defenses

      3
      T1562

      Disable or Modify Tools

      1
      T1562.001

      Disable or Modify System Firewall

      1
      T1562.004

      Modify Registry

      5
      T1112

      Discovery

      Query Registry

      4
      T1012

      Peripheral Device Discovery

      2
      T1120

      System Information Discovery

      4
      T1082

      Command and Control

      Web Service

      1
      T1102

      Impact

      Service Stop

      1
      T1489

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\fa540b62-ec7d-4689-955a-9a03a0ae0f80.down_data
        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5M5V95W2\microsoftwindows.client[1].xml
        Filesize

        97B

        MD5

        80555d968f6871cc6799b867ed731b45

        SHA1

        01bf3484a00c5daa2e2e3e8a27bcf8ade9517163

        SHA256

        fc7bfad652ca0c5f8c9e019a6a47f1e3db7b1a00fb7c52d58093e826c98a182e

        SHA512

        4d461f7b8005b9a1fb99393c0e337ec90b7b2ef94a1bf8179e5b87b1f6b9bcd14a0168d41a6e521aaeede19b6ca6ad23cd579232df2b6443806ad6698d63976d

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5M5V95W2\microsoftwindows.client[1].xml
        Filesize

        4KB

        MD5

        a188d6ac07747bf2b370200517cecd8e

        SHA1

        e2277b4d0f4a601bd30706bedf717d32658aadb8

        SHA256

        55221bcc6bd4fabba0f82ee806ffb2b4b6cc1909ae6ba58299c47e045a678854

        SHA512

        50cdeaa2de3d6c7bbc4e944f29294c22d92d7a546314113a9ca758498953d086758119d37837a5b6905968fb6acb0118c37b2418cae5d2c9e4856b0370be868c

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5M5V95W2\microsoftwindows.client[1].xml
        Filesize

        4KB

        MD5

        0f81e384bbd38bc1c4c6ffc68d9236a1

        SHA1

        ecc3e24d64aa1a87b2d2f4b7752aac00902137b9

        SHA256

        e33f68ad875611148d931bd964473a458393077b3a9eae91c8af6502d3d4b653

        SHA512

        6a3ce1dcdcefb93e9db19af278476e6f80f9deb86972f17fd61dc574793b58d977d74572c7060d830d226b0f01f8d9aae2b77b03a8cbfeaae9f668b16c856aa7

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5M5V95W2\microsoftwindows.client[1].xml
        Filesize

        14KB

        MD5

        be59e8d5198b5f7f24f6638b084e6ba9

        SHA1

        d60902ea230848a03b539bd8fd92b18674e7744c

        SHA256

        a8387cbd3791d97634fb3e0976e6c935d700aa64174da7c5e002fe970d1f58ba

        SHA512

        6a21f6a76a44fb4650cf08bf7f100dd7be1c2b209805e15aa0598790942e5835534c6525937a62167670addb7d434c9b00b3a398f2342e9e3a7174f53fcc6bce

      • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\BackgroundTransferApi\fa540b62-ec7d-4689-955a-9a03a0ae0f80.up_meta_secure
        Filesize

        1KB

        MD5

        76b585d050337c04ac6b41da5213a7ac

        SHA1

        d5e3cbfd0f2a8ef6fc9aa4811d95db449e3df073

        SHA256

        7b84ffd27567028d36e79ecf4c0df7d8afae09ff6d2c2f6e7ab33dcae9f68b4e

        SHA512

        8f10fe3f8d6f01f44d381d6d782ddf73aa527d71bf0682da237914dbe7d312262023f398184f59e3b62550e65a9d9d4c2eb0b5972f99a082baebe3594ed94162

      • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
        Filesize

        313B

        MD5

        bc1a054342041a4a1f52fff0be8339b1

        SHA1

        8c269b07aa09ec87460beee54b088858d829ada7

        SHA256

        f8d38f183edb5ba28a1340b87582f8a9edf07b8827205d3fcda8e9f305dc2ed7

        SHA512

        a49a2ae6ee0ddb16b8ad5169e899f56869313c7b86a03c1af0ecfa9a33bbc1c9a14a386295cec6ac502e772968529aa406b7ef7771483ae43bc9f845052e0d2d

      • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
        Filesize

        404B

        MD5

        95c1ef7c81d2eab8f7fe57809a4c8e96

        SHA1

        c716c398048b98966f06f3ef7c525c2d78a3757b

        SHA256

        2c9f628c7cc2c76a289fab93a89bbfbe229658abe0be460ecfb4489eaa81ff2d

        SHA512

        763b22ffa6a99cee0a19a53ff334bdbbd532eca59a99bc8552cf45ca7b0a574acae9792d77084b39513061ed5c0300342fb0e62a6ad5d3ebbc79351771e8b9c6

      • C:\Users\Admin\AppData\Local\Temp\dhylty.exe
        Filesize

        206KB

        MD5

        9f651f1d0558abd7b1c154e2f62ca805

        SHA1

        ff55de48651bd4f35b7a41b56db2c37a038289bc

        SHA256

        12d7b0e21dc5c11862794b698e2e675810fbaae69cb106e43ce2b4e372265284

        SHA512

        cf25c4402b4156c8148b8d5567f97bca98666d1c7a493e2bd661e5468599ca13adf2bd9bbc158797d4ae46113017020b65316ddeacb1126fe0ea9a5f3056a2a2

      • C:\Users\Admin\AppData\Local\Temp\fqsxpf.txt
        Filesize

        73B

        MD5

        14971ff50a2c64ab66b3c75dbc7d4843

        SHA1

        06ccc16cc89657fcb273ce32a9e08e390bb941b2

        SHA256

        89958b18030ce0c7df6fbfd12060ad8352ed9db5c15d322fcefcf3fc3989519d

        SHA512

        1aa3ec9efab14b0aca49605e721555e5f4c04dc289faa5513948bca004da9c8c7ed615f1d75d40b2ab14dab03500bdb3939c497b8e10bf67378e1557556c3f7e

      • memory/1584-177-0x0000019570800000-0x0000019570900000-memory.dmp
        Filesize

        1024KB

      • memory/1584-33-0x000001955F100000-0x000001955F200000-memory.dmp
        Filesize

        1024KB

      • memory/1584-109-0x0000019572050000-0x0000019572070000-memory.dmp
        Filesize

        128KB

      • memory/1584-111-0x0000019572090000-0x00000195720B0000-memory.dmp
        Filesize

        128KB

      • memory/1584-174-0x0000019575000000-0x0000019575100000-memory.dmp
        Filesize

        1024KB

      • memory/1584-173-0x0000019575000000-0x0000019575100000-memory.dmp
        Filesize

        1024KB

      • memory/1584-172-0x0000019575000000-0x0000019575100000-memory.dmp
        Filesize

        1024KB

      • memory/1584-190-0x0000019573F90000-0x0000019573FB0000-memory.dmp
        Filesize

        128KB

      • memory/1584-741-0x00000195730A0000-0x00000195731A0000-memory.dmp
        Filesize

        1024KB

      • memory/1584-225-0x0000019573F70000-0x0000019573F90000-memory.dmp
        Filesize

        128KB

      • memory/1584-226-0x0000019573F50000-0x0000019573F70000-memory.dmp
        Filesize

        128KB

      • memory/1584-69-0x00000195713A0000-0x00000195713C0000-memory.dmp
        Filesize

        128KB

      • memory/1584-60-0x0000019571200000-0x0000019571300000-memory.dmp
        Filesize

        1024KB

      • memory/1584-85-0x00000195721D0000-0x00000195722D0000-memory.dmp
        Filesize

        1024KB

      • memory/1584-492-0x0000019572050000-0x0000019572070000-memory.dmp
        Filesize

        128KB

      • memory/1584-483-0x00000195703C0000-0x00000195703E0000-memory.dmp
        Filesize

        128KB

      • memory/1584-441-0x00000195730A0000-0x00000195731A0000-memory.dmp
        Filesize

        1024KB

      • memory/1584-463-0x0000019572590000-0x00000195725B0000-memory.dmp
        Filesize

        128KB

      • memory/1584-467-0x00000195730A0000-0x00000195731A0000-memory.dmp
        Filesize

        1024KB

      • memory/1824-0-0x00007FFA986B3000-0x00007FFA986B5000-memory.dmp
        Filesize

        8KB

      • memory/1824-7-0x00007FFA986B0000-0x00007FFA99172000-memory.dmp
        Filesize

        10.8MB

      • memory/1824-6-0x00007FFA986B0000-0x00007FFA99172000-memory.dmp
        Filesize

        10.8MB

      • memory/1824-1-0x0000000000170000-0x0000000000184000-memory.dmp
        Filesize

        80KB

      • memory/1824-1249-0x000000001BD10000-0x000000001BD1E000-memory.dmp
        Filesize

        56KB

      • memory/2268-18-0x0000000000400000-0x0000000000487000-memory.dmp
        Filesize

        540KB

      • memory/2268-20-0x0000000000400000-0x0000000000487000-memory.dmp
        Filesize

        540KB

      • memory/2268-15-0x0000000000400000-0x0000000000487000-memory.dmp
        Filesize

        540KB