Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2023 02:31

General

  • Target

    4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde.exe

  • Size

    753KB

  • MD5

    912a9f5960f78c14a1bfe528860b5cc5

  • SHA1

    6e23c3b72f56358efc066b6ae60d173902a0f033

  • SHA256

    4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

  • SHA512

    0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

  • SSDEEP

    12288:2ufjVpNKUF3OjhlYnf8KPGNaTp7WeqCdmgzKrQXOxTXbebLw7:2sGQOjhlYUUGkp7FzO

Malware Config

Signatures

  • Detect Xworm Payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde.exe
    "C:\Users\Admin\AppData\Local\Temp\4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\hhrjcird.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 9
        3⤵
        • Runs ping.exe
        PID:1996
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\hhrjcird.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:2068
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 9 > nul && copy "C:\Users\Admin\AppData\Local\Temp\4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde.exe" "C:\Users\Admin\AppData\Roaming\hhrjcird.exe" && ping 127.0.0.1 -n 9 > nul && "C:\Users\Admin\AppData\Roaming\hhrjcird.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 9
        3⤵
        • Runs ping.exe
        PID:2804
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 9
        3⤵
        • Runs ping.exe
        PID:2756
      • C:\Users\Admin\AppData\Roaming\hhrjcird.exe
        "C:\Users\Admin\AppData\Roaming\hhrjcird.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
            PID:3048
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2392
          • C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe
            "C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe
              "C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.txt

      Filesize

      54B

      MD5

      96be7f86b2c6b158f6d6520e515b9845

      SHA1

      d51e21d48161e9db5b53905223f083307876983b

      SHA256

      bf09dde54474083d6de1e52c6d525c3ad212f916b3c413c971affdffedccfc30

      SHA512

      4c2c0136cd148a347156d87e0768e5fc2e6e0019e66e2d7a83f9c88c035b5f461cba3a941d8ef0ab8915376af403f9a3febe4dc7cbdd9f3447678c74cecb48f7

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.txt

      Filesize

      57B

      MD5

      57839cd4bbfc3d5d964f1dda11dbf399

      SHA1

      4f353e4a100aabbab798204d5817b108e32f1b7e

      SHA256

      77de8007a5ff3f6b3fa89783bc09889a602a6e7effcbde9f2c13228993b0d75c

      SHA512

      3f152af8936bfbe46048201b03cd6ce5585034d32ea4f908dfdaea7b75014277d4c629429759dee5a4088c490675f3338b03b39bbb71928e88986d19e0f6cd0e

    • C:\Users\Admin\AppData\Local\Temp\UehdjUej.txt

      Filesize

      57B

      MD5

      57839cd4bbfc3d5d964f1dda11dbf399

      SHA1

      4f353e4a100aabbab798204d5817b108e32f1b7e

      SHA256

      77de8007a5ff3f6b3fa89783bc09889a602a6e7effcbde9f2c13228993b0d75c

      SHA512

      3f152af8936bfbe46048201b03cd6ce5585034d32ea4f908dfdaea7b75014277d4c629429759dee5a4088c490675f3338b03b39bbb71928e88986d19e0f6cd0e

    • C:\Users\Admin\AppData\Roaming\hhrjcird.exe

      Filesize

      753KB

      MD5

      912a9f5960f78c14a1bfe528860b5cc5

      SHA1

      6e23c3b72f56358efc066b6ae60d173902a0f033

      SHA256

      4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

      SHA512

      0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

    • C:\Users\Admin\AppData\Roaming\hhrjcird.exe

      Filesize

      753KB

      MD5

      912a9f5960f78c14a1bfe528860b5cc5

      SHA1

      6e23c3b72f56358efc066b6ae60d173902a0f033

      SHA256

      4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

      SHA512

      0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

    • C:\Users\Admin\AppData\Roaming\hhrjcird.exe

      Filesize

      753KB

      MD5

      912a9f5960f78c14a1bfe528860b5cc5

      SHA1

      6e23c3b72f56358efc066b6ae60d173902a0f033

      SHA256

      4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

      SHA512

      0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

    • \Users\Admin\AppData\Local\Temp\UehdjUej.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • \Users\Admin\AppData\Local\Temp\UehdjUej.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • \Users\Admin\AppData\Roaming\hhrjcird.exe

      Filesize

      753KB

      MD5

      912a9f5960f78c14a1bfe528860b5cc5

      SHA1

      6e23c3b72f56358efc066b6ae60d173902a0f033

      SHA256

      4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

      SHA512

      0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

    • \Users\Admin\AppData\Roaming\hhrjcird.exe

      Filesize

      753KB

      MD5

      912a9f5960f78c14a1bfe528860b5cc5

      SHA1

      6e23c3b72f56358efc066b6ae60d173902a0f033

      SHA256

      4f49150cb8b4ed358d59ab2d9e15a6161b69658e45e54419c536dd77487a2fde

      SHA512

      0b09a77600c9df2ece04e6ef4f5ff3ba2779b15f7a33bcfc4ee0c71ebcdbe16b5f9585ec931449427855131a1d265c1e8b76f27a341d0294ac921e3a5a7cd352

    • memory/1076-75-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/1076-67-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/1892-0-0x0000000000E20000-0x0000000000EE2000-memory.dmp

      Filesize

      776KB

    • memory/1892-4-0x0000000074300000-0x00000000749EE000-memory.dmp

      Filesize

      6.9MB

    • memory/1892-3-0x00000000046D0000-0x0000000004714000-memory.dmp

      Filesize

      272KB

    • memory/1892-2-0x0000000004730000-0x0000000004770000-memory.dmp

      Filesize

      256KB

    • memory/1892-1-0x0000000074300000-0x00000000749EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2392-42-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2392-69-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-76-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-73-0x00000000072D0000-0x000000000743E000-memory.dmp

      Filesize

      1.4MB

    • memory/2392-74-0x0000000002290000-0x00000000022C0000-memory.dmp

      Filesize

      192KB

    • memory/2392-43-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2392-72-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-49-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-51-0x0000000000870000-0x000000000088C000-memory.dmp

      Filesize

      112KB

    • memory/2392-50-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-48-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-47-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/2392-46-0x0000000000820000-0x000000000083E000-memory.dmp

      Filesize

      120KB

    • memory/2392-71-0x0000000004D80000-0x0000000004DC0000-memory.dmp

      Filesize

      256KB

    • memory/2392-70-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/2392-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2560-66-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/2560-59-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/2560-58-0x0000000000240000-0x000000000025A000-memory.dmp

      Filesize

      104KB

    • memory/3044-16-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/3044-41-0x0000000004D50000-0x0000000004D90000-memory.dmp

      Filesize

      256KB

    • memory/3044-19-0x00000000005C0000-0x00000000005C6000-memory.dmp

      Filesize

      24KB

    • memory/3044-18-0x0000000000430000-0x000000000044A000-memory.dmp

      Filesize

      104KB

    • memory/3044-17-0x0000000004D50000-0x0000000004D90000-memory.dmp

      Filesize

      256KB

    • memory/3044-39-0x00000000742B0000-0x000000007499E000-memory.dmp

      Filesize

      6.9MB

    • memory/3044-15-0x00000000002C0000-0x0000000000382000-memory.dmp

      Filesize

      776KB

    • memory/3044-40-0x0000000004D50000-0x0000000004D90000-memory.dmp

      Filesize

      256KB

    • memory/3048-28-0x0000000000080000-0x00000000000B2000-memory.dmp

      Filesize

      200KB

    • memory/3048-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3048-20-0x0000000000080000-0x00000000000B2000-memory.dmp

      Filesize

      200KB

    • memory/3048-26-0x0000000000080000-0x00000000000B2000-memory.dmp

      Filesize

      200KB

    • memory/3048-24-0x0000000000080000-0x00000000000B2000-memory.dmp

      Filesize

      200KB

    • memory/3048-22-0x0000000000080000-0x00000000000B2000-memory.dmp

      Filesize

      200KB