Analysis
-
max time kernel
94s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/04/2023, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
LOIC.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LOIC.exe
Resource
win10v2004-20230220-en
General
-
Target
LOIC.exe
-
Size
209KB
-
MD5
7cb9f6a59e68b2ff13af6c629db1ab54
-
SHA1
727d438190baabbc3986d5721260a484f535d498
-
SHA256
129577a032e9a1587de4d3b328653a486421f85db2c395d6f6804f4d07748102
-
SHA512
2708ec99536157eba955d80b9c959442a1fc471a2937579dcb1c26fc2736f1eab168ee833c88677e022384fdd23ce4de08d41929089a7400548ca2cd90cb3928
-
SSDEEP
6144:5SsXvMGBQynRGt+oVRkgym5gWoIBaU0MAovCyJZG3g9m:5S60QhRtjgymqWjoT3j
Malware Config
Extracted
xworm
ftap-29332.portmap.host:29332
-
install_file
svchost.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1952-107-0x000000001ACF0000-0x000000001ACFC000-memory.dmp disable_win_def -
Executes dropped EXE 2 IoCs
pid Process 1152 LOICCONFIG.exe 1952 xw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\xw = "C:\\Users\\Public\\xw.exe" LOIC.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1952 xw.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1240 LOIC.exe 1756 powershell.exe 952 powershell.exe 1776 powershell.exe 1952 xw.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1240 LOIC.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 1952 xw.exe Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 1952 xw.exe Token: SeShutdownPrivilege 1952 xw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 xw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1152 1240 LOIC.exe 28 PID 1240 wrote to memory of 1152 1240 LOIC.exe 28 PID 1240 wrote to memory of 1152 1240 LOIC.exe 28 PID 1240 wrote to memory of 1152 1240 LOIC.exe 28 PID 1240 wrote to memory of 1756 1240 LOIC.exe 29 PID 1240 wrote to memory of 1756 1240 LOIC.exe 29 PID 1240 wrote to memory of 1756 1240 LOIC.exe 29 PID 1240 wrote to memory of 1952 1240 LOIC.exe 31 PID 1240 wrote to memory of 1952 1240 LOIC.exe 31 PID 1240 wrote to memory of 1952 1240 LOIC.exe 31 PID 1952 wrote to memory of 952 1952 xw.exe 32 PID 1952 wrote to memory of 952 1952 xw.exe 32 PID 1952 wrote to memory of 952 1952 xw.exe 32 PID 1952 wrote to memory of 1776 1952 xw.exe 34 PID 1952 wrote to memory of 1776 1952 xw.exe 34 PID 1952 wrote to memory of 1776 1952 xw.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOIC.exe"C:\Users\Admin\AppData\Local\Temp\LOIC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\LOICCONFIG.exe"C:\Users\Admin\AppData\Local\Temp\LOICCONFIG.exe"2⤵
- Executes dropped EXE
PID:1152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\xw.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Public\xw.exe"C:\Users\Public\xw.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\xw.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'xw.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD58ffce13e81f70d522d8f7174b603c878
SHA15c94c5908d3ac5ce07f2e684a0d503673e01f2e3
SHA25605ee881ff93cbaf6d0f276bfb1018c1291fc47832c2b46a756980eb67477ffb2
SHA5121fcb89546387b232dfe7b9c84af180688ec1ade341a3a6c9f9f05f5676b44eec986d9606b597d1f23f8e0ea675d3429c9905e2d5470dcc1bc9ffe50e39a0f524
-
Filesize
263KB
MD58ffce13e81f70d522d8f7174b603c878
SHA15c94c5908d3ac5ce07f2e684a0d503673e01f2e3
SHA25605ee881ff93cbaf6d0f276bfb1018c1291fc47832c2b46a756980eb67477ffb2
SHA5121fcb89546387b232dfe7b9c84af180688ec1ade341a3a6c9f9f05f5676b44eec986d9606b597d1f23f8e0ea675d3429c9905e2d5470dcc1bc9ffe50e39a0f524
-
Filesize
263KB
MD58ffce13e81f70d522d8f7174b603c878
SHA15c94c5908d3ac5ce07f2e684a0d503673e01f2e3
SHA25605ee881ff93cbaf6d0f276bfb1018c1291fc47832c2b46a756980eb67477ffb2
SHA5121fcb89546387b232dfe7b9c84af180688ec1ade341a3a6c9f9f05f5676b44eec986d9606b597d1f23f8e0ea675d3429c9905e2d5470dcc1bc9ffe50e39a0f524
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1D95MH2UHRNL6M6RL9KX.temp
Filesize7KB
MD51d4a59302e94ebcc26c208fb7161a199
SHA1ddd570bddc09bbf306e37e803aef81eacc366432
SHA256913e64ede1d3af1b562e034015e4a60a9795af2842d7734d2615a997dda5ffa4
SHA5127e4413596fca9d6e49e9038c158fdfc17fff7c130544c7e397ca737c0323e3eb5d2e6d41d25e02ffaa73024b8e52f198aae0cba79d5224ad48ba0f7c7f3ef6a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51d4a59302e94ebcc26c208fb7161a199
SHA1ddd570bddc09bbf306e37e803aef81eacc366432
SHA256913e64ede1d3af1b562e034015e4a60a9795af2842d7734d2615a997dda5ffa4
SHA5127e4413596fca9d6e49e9038c158fdfc17fff7c130544c7e397ca737c0323e3eb5d2e6d41d25e02ffaa73024b8e52f198aae0cba79d5224ad48ba0f7c7f3ef6a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51d4a59302e94ebcc26c208fb7161a199
SHA1ddd570bddc09bbf306e37e803aef81eacc366432
SHA256913e64ede1d3af1b562e034015e4a60a9795af2842d7734d2615a997dda5ffa4
SHA5127e4413596fca9d6e49e9038c158fdfc17fff7c130544c7e397ca737c0323e3eb5d2e6d41d25e02ffaa73024b8e52f198aae0cba79d5224ad48ba0f7c7f3ef6a6
-
Filesize
77KB
MD5cf9bb6bcb4e51296329600f209a65ee0
SHA1a3158e2ffc0f6dc6bc9d73db70ca1545444f9c56
SHA256b50f8c77e619bd96d9b7759790c1efddcab22d0ce0490cb0fd393936ea7ae1cd
SHA5123b3994ba2a609751658b1dfb29a542f74d5904e0507d3e13859a3dd82195a9640d16fc527f68a2e609bf368582a59bfe67ca850a0e5cfd1c58d7ee7a993f3bc6
-
Filesize
77KB
MD5cf9bb6bcb4e51296329600f209a65ee0
SHA1a3158e2ffc0f6dc6bc9d73db70ca1545444f9c56
SHA256b50f8c77e619bd96d9b7759790c1efddcab22d0ce0490cb0fd393936ea7ae1cd
SHA5123b3994ba2a609751658b1dfb29a542f74d5904e0507d3e13859a3dd82195a9640d16fc527f68a2e609bf368582a59bfe67ca850a0e5cfd1c58d7ee7a993f3bc6