Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe
-
Size
408KB
-
MD5
afca5eaa6d402c37a8aa7d93110c97f0
-
SHA1
e5d797b50a51b9595a85260ec353768ab1515258
-
SHA256
a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6
-
SHA512
58e02fc9badafbc3a0dee25a4d5af4435dc1830f6e8a8af074ca9b1adafadacd81db74068d8a78c9809cafcbcb8f5945cf4020635d724d77299020c8a1679c03
-
SSDEEP
6144:LJgOMsar5xbivcUblrM2KDBXQseSDCOTMAtBMA1kqDzumBFTLv++GDZMj:mOMxWcqrlK1XHeSDCOIkBzbD59BGVY
Malware Config
Extracted
xworm
3.1
atelilian99.ddns.net:8282
XqUeUiDC1kQH7xwL
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/memory/2596-24-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2596-26-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2596-30-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2596-32-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2596-34-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2788-39-0x00000000026D0000-0x0000000002710000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.lnk a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.lnk a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC = "C:\\Users\\Admin\\AppData\\Roaming\\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe" a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 2788 powershell.exe 1724 powershell.exe 2596 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe Token: SeDebugPrivilege 2596 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 1724 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2788 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 29 PID 2228 wrote to memory of 2788 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 29 PID 2228 wrote to memory of 2788 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 29 PID 2228 wrote to memory of 2788 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 29 PID 2228 wrote to memory of 1724 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 31 PID 2228 wrote to memory of 1724 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 31 PID 2228 wrote to memory of 1724 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 31 PID 2228 wrote to memory of 1724 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 31 PID 2228 wrote to memory of 2548 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 33 PID 2228 wrote to memory of 2548 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 33 PID 2228 wrote to memory of 2548 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 33 PID 2228 wrote to memory of 2548 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 33 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35 PID 2228 wrote to memory of 2596 2228 a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe"C:\Users\Admin\AppData\Local\Temp\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RWtKOUV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RWtKOUV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5EA4.tmp"2⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe"C:\Users\Admin\AppData\Local\Temp\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54398211bb39eb2b8c7492703362a0d14
SHA165f429c27adc32b672c52939552baab1593d05cd
SHA2560ac6e7166671acdb0bf2604385829e1b9a846206689311a3bb4990c5c4e24471
SHA512b1405967f4775fb7015b358271554dad12a551ef7bbf76595453d422054206e3c60dba55dded6a986dfc9f21989996a5d425464e92071a9e8e24c630b35c8b3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F7GSW6JHY9IW30QUULAX.temp
Filesize7KB
MD521e4d3199f6afb221122b809a517c2af
SHA173532b134e810226e47916589ced7c6afdf31b2d
SHA256f8eb447fa72d92b348a937782494a7139d6936043c6c4f327ec47c9bbd50e3a3
SHA51290001a9e41be16ccd2ae52abb17ab895365d4f109612c7ed08491acdb15c885823e2aa8251cf9594aacd46ee6279d097ed4ea0c4dfb22cbc90f8dcdcf42fdf21
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD521e4d3199f6afb221122b809a517c2af
SHA173532b134e810226e47916589ced7c6afdf31b2d
SHA256f8eb447fa72d92b348a937782494a7139d6936043c6c4f327ec47c9bbd50e3a3
SHA51290001a9e41be16ccd2ae52abb17ab895365d4f109612c7ed08491acdb15c885823e2aa8251cf9594aacd46ee6279d097ed4ea0c4dfb22cbc90f8dcdcf42fdf21
-
C:\Users\Admin\AppData\Roaming\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe
Filesize408KB
MD5afca5eaa6d402c37a8aa7d93110c97f0
SHA1e5d797b50a51b9595a85260ec353768ab1515258
SHA256a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6
SHA51258e02fc9badafbc3a0dee25a4d5af4435dc1830f6e8a8af074ca9b1adafadacd81db74068d8a78c9809cafcbcb8f5945cf4020635d724d77299020c8a1679c03
-
\Users\Admin\AppData\Roaming\a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6_JC.exe
Filesize408KB
MD5afca5eaa6d402c37a8aa7d93110c97f0
SHA1e5d797b50a51b9595a85260ec353768ab1515258
SHA256a1d6f223fa3e037cea557b5b5aa79bea29060a9a323ca9974806a04ad05a3dc6
SHA51258e02fc9badafbc3a0dee25a4d5af4435dc1830f6e8a8af074ca9b1adafadacd81db74068d8a78c9809cafcbcb8f5945cf4020635d724d77299020c8a1679c03