Analysis

  • max time kernel
    33s
  • max time network
    37s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231128-en
  • resource tags

    arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-12-2023 21:24

General

  • Target

    HWID.exe

  • Size

    149KB

  • MD5

    2c1ec91ada25a4a34441200dd9773c2a

  • SHA1

    80154f3f48a32866de9742bed33ebb907086125e

  • SHA256

    0f8980228acd3d9dd7bc9208c13a68b244ee903212327e4d350a82010aa37993

  • SHA512

    0ff2d7b2ac069c8bb2b381333f896b2d09ee0c0ec23b1943c35ae758adc71bd34c69502fb22208b1bdb568bda8a908ed548f407010d09532664b02d83fde5b99

  • SSDEEP

    3072:+r8dXu13UyQlK/UbZcZJuQCdM79xQbj8alpC5cgiTWMolM2i:+r8de1krcsbQuQpUQallgiboF

Malware Config

Extracted

Family

xworm

C2

owner-cc.gl.at.ply.gg:32281

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsSoundSystem.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1181010758201520208/iCxvWqp_69ofS-eHs5naW1_4vBzPxLSr9zIR5Bso1e4orm8yDICPrre5CTF60DCywY_3

Signatures

  • Detect Umbral payload 6 IoCs
  • Detect Xworm Payload 5 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWID.exe
    "C:\Users\Admin\AppData\Local\Temp\HWID.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2472
    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4064
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1996
    • C:\Users\Admin\AppData\Local\Temp\HWID.exe
      "C:\Users\Admin\AppData\Local\Temp\HWID.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
      • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HWID.exe.log

      Filesize

      1KB

      MD5

      529d88befdcb9c82af230a03da30f9d2

      SHA1

      faafd7f649d768355060daedcef19d0c46bfffbb

      SHA256

      d4467a14b864014afce828690ec3f85f09cbf661796515c7bcaa9aefac5c0eaa

      SHA512

      5ca250ab149ce6e88e4e68e95c6bfcf8c43db9cd214325f63b7e520fabc64dd8e6ba75d20108af8308a16956ec131a300d5a99e7221c49daa4aa13755e8f13a1

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Blue Tooth.exe.log

      Filesize

      1KB

      MD5

      02df789e3c730b309fc4d9abce5d729b

      SHA1

      4f9da0f0d4cadacfd0f68fb1f7ee73a66dcf1b4e

      SHA256

      4afabcd1723096359d90c8f32df7a6a44cd866e89d5b37c89280bfeab61d7321

      SHA512

      7ac0dd7e3a3e483d07409da793dd2b0915d4369fe41fe743acd82de9aa77b9fa7ea5cd60498034f3fa0674d93d184c9128375d8f7f0796fddecff3845fca8587

    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe

      Filesize

      229KB

      MD5

      33405e3ec22e3bd98c3339fa179438b6

      SHA1

      77134fb582641f0a54007b6ea92c5ad62ef3ed62

      SHA256

      f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019

      SHA512

      fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56

    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe

      Filesize

      229KB

      MD5

      33405e3ec22e3bd98c3339fa179438b6

      SHA1

      77134fb582641f0a54007b6ea92c5ad62ef3ed62

      SHA256

      f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019

      SHA512

      fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56

    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe

      Filesize

      229KB

      MD5

      33405e3ec22e3bd98c3339fa179438b6

      SHA1

      77134fb582641f0a54007b6ea92c5ad62ef3ed62

      SHA256

      f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019

      SHA512

      fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56

    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe

      Filesize

      229KB

      MD5

      33405e3ec22e3bd98c3339fa179438b6

      SHA1

      77134fb582641f0a54007b6ea92c5ad62ef3ed62

      SHA256

      f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019

      SHA512

      fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56

    • C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe

      Filesize

      229KB

      MD5

      33405e3ec22e3bd98c3339fa179438b6

      SHA1

      77134fb582641f0a54007b6ea92c5ad62ef3ed62

      SHA256

      f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019

      SHA512

      fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56

    • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe

      Filesize

      75KB

      MD5

      cf4187443a0b1f17e74f66723631a822

      SHA1

      2e17093723097c3729d29d19da3df6d7e18e37be

      SHA256

      5eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887

      SHA512

      2f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7

    • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe

      Filesize

      75KB

      MD5

      cf4187443a0b1f17e74f66723631a822

      SHA1

      2e17093723097c3729d29d19da3df6d7e18e37be

      SHA256

      5eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887

      SHA512

      2f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7

    • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe

      Filesize

      75KB

      MD5

      cf4187443a0b1f17e74f66723631a822

      SHA1

      2e17093723097c3729d29d19da3df6d7e18e37be

      SHA256

      5eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887

      SHA512

      2f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7

    • C:\Users\Admin\AppData\Local\Temp\Windows sound.exe

      Filesize

      75KB

      MD5

      cf4187443a0b1f17e74f66723631a822

      SHA1

      2e17093723097c3729d29d19da3df6d7e18e37be

      SHA256

      5eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887

      SHA512

      2f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7

    • memory/812-58-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/812-59-0x000001ACE85B0000-0x000001ACE85C0000-memory.dmp

      Filesize

      64KB

    • memory/812-60-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2040-25-0x00000209786C0000-0x0000020978700000-memory.dmp

      Filesize

      256KB

    • memory/2040-31-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2040-33-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2040-29-0x000002097A630000-0x000002097A640000-memory.dmp

      Filesize

      64KB

    • memory/2136-62-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2136-57-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2472-27-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2472-34-0x000000001AEA0000-0x000000001AEB0000-memory.dmp

      Filesize

      64KB

    • memory/2472-39-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2472-42-0x000000001AEA0000-0x000000001AEB0000-memory.dmp

      Filesize

      64KB

    • memory/2472-28-0x0000000000100000-0x000000000011A000-memory.dmp

      Filesize

      104KB

    • memory/2740-0-0x0000000000830000-0x000000000085C000-memory.dmp

      Filesize

      176KB

    • memory/2740-30-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/2740-2-0x000000001B490000-0x000000001B4A0000-memory.dmp

      Filesize

      64KB

    • memory/2740-1-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/4460-54-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB

    • memory/4460-41-0x00007FF9D1860000-0x00007FF9D2322000-memory.dmp

      Filesize

      10.8MB