Resubmissions
07-12-2023 23:09
231207-25d1hagb25 10Analysis
-
max time kernel
82s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-es -
resource tags
arch:x64arch:x86image:win10v2004-20231127-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07-12-2023 23:09
Static task
static1
General
-
Target
HWID.exe
-
Size
149KB
-
MD5
2c1ec91ada25a4a34441200dd9773c2a
-
SHA1
80154f3f48a32866de9742bed33ebb907086125e
-
SHA256
0f8980228acd3d9dd7bc9208c13a68b244ee903212327e4d350a82010aa37993
-
SHA512
0ff2d7b2ac069c8bb2b381333f896b2d09ee0c0ec23b1943c35ae758adc71bd34c69502fb22208b1bdb568bda8a908ed548f407010d09532664b02d83fde5b99
-
SSDEEP
3072:+r8dXu13UyQlK/UbZcZJuQCdM79xQbj8alpC5cgiTWMolM2i:+r8de1krcsbQuQpUQallgiboF
Malware Config
Extracted
xworm
owner-cc.gl.at.ply.gg:32281
-
Install_directory
%AppData%
-
install_file
WindowsSoundSystem.exe
Extracted
umbral
https://discord.com/api/webhooks/1181010758201520208/iCxvWqp_69ofS-eHs5naW1_4vBzPxLSr9zIR5Bso1e4orm8yDICPrre5CTF60DCywY_3
Signatures
-
Detect Umbral payload 6 IoCs
resource yara_rule behavioral1/files/0x000800000002320e-18.dat family_umbral behavioral1/files/0x000800000002320e-26.dat family_umbral behavioral1/memory/4704-28-0x00000290A97D0000-0x00000290A9810000-memory.dmp family_umbral behavioral1/files/0x000800000002320e-25.dat family_umbral behavioral1/files/0x000800000002320e-59.dat family_umbral behavioral1/files/0x000800000002320e-58.dat family_umbral -
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x000900000002320c-7.dat family_xworm behavioral1/files/0x000900000002320c-12.dat family_xworm behavioral1/files/0x000900000002320c-13.dat family_xworm behavioral1/memory/3352-22-0x0000000000660000-0x000000000067A000-memory.dmp family_xworm behavioral1/files/0x000900000002320c-48.dat family_xworm -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation HWID.exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation HWID.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe -
Executes dropped EXE 4 IoCs
pid Process 3352 Windows sound.exe 4704 Windows Blue Tooth.exe 1064 Windows sound.exe 4856 Windows Blue Tooth.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 82 ip-api.com 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5100 HWID.exe Token: SeDebugPrivilege 3352 Windows sound.exe Token: SeDebugPrivilege 4704 Windows Blue Tooth.exe Token: SeIncreaseQuotaPrivilege 2172 wmic.exe Token: SeSecurityPrivilege 2172 wmic.exe Token: SeTakeOwnershipPrivilege 2172 wmic.exe Token: SeLoadDriverPrivilege 2172 wmic.exe Token: SeSystemProfilePrivilege 2172 wmic.exe Token: SeSystemtimePrivilege 2172 wmic.exe Token: SeProfSingleProcessPrivilege 2172 wmic.exe Token: SeIncBasePriorityPrivilege 2172 wmic.exe Token: SeCreatePagefilePrivilege 2172 wmic.exe Token: SeBackupPrivilege 2172 wmic.exe Token: SeRestorePrivilege 2172 wmic.exe Token: SeShutdownPrivilege 2172 wmic.exe Token: SeDebugPrivilege 2172 wmic.exe Token: SeSystemEnvironmentPrivilege 2172 wmic.exe Token: SeRemoteShutdownPrivilege 2172 wmic.exe Token: SeUndockPrivilege 2172 wmic.exe Token: SeManageVolumePrivilege 2172 wmic.exe Token: 33 2172 wmic.exe Token: 34 2172 wmic.exe Token: 35 2172 wmic.exe Token: 36 2172 wmic.exe Token: SeIncreaseQuotaPrivilege 2172 wmic.exe Token: SeSecurityPrivilege 2172 wmic.exe Token: SeTakeOwnershipPrivilege 2172 wmic.exe Token: SeLoadDriverPrivilege 2172 wmic.exe Token: SeSystemProfilePrivilege 2172 wmic.exe Token: SeSystemtimePrivilege 2172 wmic.exe Token: SeProfSingleProcessPrivilege 2172 wmic.exe Token: SeIncBasePriorityPrivilege 2172 wmic.exe Token: SeCreatePagefilePrivilege 2172 wmic.exe Token: SeBackupPrivilege 2172 wmic.exe Token: SeRestorePrivilege 2172 wmic.exe Token: SeShutdownPrivilege 2172 wmic.exe Token: SeDebugPrivilege 2172 wmic.exe Token: SeSystemEnvironmentPrivilege 2172 wmic.exe Token: SeRemoteShutdownPrivilege 2172 wmic.exe Token: SeUndockPrivilege 2172 wmic.exe Token: SeManageVolumePrivilege 2172 wmic.exe Token: 33 2172 wmic.exe Token: 34 2172 wmic.exe Token: 35 2172 wmic.exe Token: 36 2172 wmic.exe Token: SeDebugPrivilege 3352 Windows sound.exe Token: SeDebugPrivilege 3840 HWID.exe Token: SeDebugPrivilege 1064 Windows sound.exe Token: SeDebugPrivilege 4856 Windows Blue Tooth.exe Token: SeIncreaseQuotaPrivilege 3128 wmic.exe Token: SeSecurityPrivilege 3128 wmic.exe Token: SeTakeOwnershipPrivilege 3128 wmic.exe Token: SeLoadDriverPrivilege 3128 wmic.exe Token: SeSystemProfilePrivilege 3128 wmic.exe Token: SeSystemtimePrivilege 3128 wmic.exe Token: SeProfSingleProcessPrivilege 3128 wmic.exe Token: SeIncBasePriorityPrivilege 3128 wmic.exe Token: SeCreatePagefilePrivilege 3128 wmic.exe Token: SeBackupPrivilege 3128 wmic.exe Token: SeRestorePrivilege 3128 wmic.exe Token: SeShutdownPrivilege 3128 wmic.exe Token: SeDebugPrivilege 3128 wmic.exe Token: SeSystemEnvironmentPrivilege 3128 wmic.exe Token: SeRemoteShutdownPrivilege 3128 wmic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3352 5100 HWID.exe 91 PID 5100 wrote to memory of 3352 5100 HWID.exe 91 PID 5100 wrote to memory of 4704 5100 HWID.exe 92 PID 5100 wrote to memory of 4704 5100 HWID.exe 92 PID 4704 wrote to memory of 2172 4704 Windows Blue Tooth.exe 95 PID 4704 wrote to memory of 2172 4704 Windows Blue Tooth.exe 95 PID 3840 wrote to memory of 1064 3840 HWID.exe 122 PID 3840 wrote to memory of 1064 3840 HWID.exe 122 PID 3840 wrote to memory of 4856 3840 HWID.exe 123 PID 3840 wrote to memory of 4856 3840 HWID.exe 123 PID 4856 wrote to memory of 3128 4856 Windows Blue Tooth.exe 124 PID 4856 wrote to memory of 3128 4856 Windows Blue Tooth.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWID.exe"C:\Users\Admin\AppData\Local\Temp\HWID.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\HWID.exe"C:\Users\Admin\AppData\Local\Temp\HWID.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\HWID.exe"C:\Users\Admin\AppData\Local\Temp\HWID.exe"1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb6a89a9355baba2918bb7c32eca1c94
SHA1976c76dfbc072e405ce0d0b9314fe5b9e84cb1b2
SHA256192fbb7f4d1396fd4846854c5472a60aa80932f3c754f2c2f1a2a136c8a6bb4b
SHA512efdf0c6228c3a8a7550804ac921dfefc5265eb2c9bbf4b8b00cedd427c0a5adf610586b844ff444bd717abff138affcbe49632ce984cbffc5fa8019b4ba6ec0f
-
Filesize
1KB
MD58094b248fe3231e48995c2be32aeb08c
SHA12fe06e000ebec919bf982d033c5d1219c1f916b6
SHA256136c30d964f4abbb5279bdc86d0e00578333782f15f05f0d2d050730dcb7a9bc
SHA512bf27a3822008796370e2c506c910a40992b9240606ea1bc19f683b2fee86b81897660ac0cf8e746ca093dae9e408949e2e9002ded75678a69f020d3b0452801f
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7