Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 11:35
Behavioral task
behavioral1
Sample
msmng2.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
msmng2.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
Family
xworm
Version
5.0
C2
5.182.87.154:7000
aes.plain
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4184-0-0x0000000000640000-0x0000000000860000-memory.dmp family_xworm behavioral2/memory/2948-278-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4184-0-0x0000000000640000-0x0000000000860000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4184 set thread context of 2948 4184 msmng2.exe 103 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 4184 msmng2.exe 212 powershell.exe 212 powershell.exe 212 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 3792 powershell.exe 3792 powershell.exe 3792 powershell.exe 3864 powershell.exe 3864 powershell.exe 3864 powershell.exe 2948 MSBuild.exe 2948 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4184 msmng2.exe Token: SeDebugPrivilege 2948 MSBuild.exe Token: SeDebugPrivilege 212 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 3792 powershell.exe Token: SeDebugPrivilege 3864 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4184 msmng2.exe 4184 msmng2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4184 msmng2.exe 4184 msmng2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 MSBuild.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 4184 wrote to memory of 2948 4184 msmng2.exe 103 PID 2948 wrote to memory of 212 2948 MSBuild.exe 105 PID 2948 wrote to memory of 212 2948 MSBuild.exe 105 PID 2948 wrote to memory of 212 2948 MSBuild.exe 105 PID 2948 wrote to memory of 2612 2948 MSBuild.exe 107 PID 2948 wrote to memory of 2612 2948 MSBuild.exe 107 PID 2948 wrote to memory of 2612 2948 MSBuild.exe 107 PID 2948 wrote to memory of 3792 2948 MSBuild.exe 109 PID 2948 wrote to memory of 3792 2948 MSBuild.exe 109 PID 2948 wrote to memory of 3792 2948 MSBuild.exe 109 PID 2948 wrote to memory of 3864 2948 MSBuild.exe 111 PID 2948 wrote to memory of 3864 2948 MSBuild.exe 111 PID 2948 wrote to memory of 3864 2948 MSBuild.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\msmng2.exe"C:\Users\Admin\AppData\Local\Temp\msmng2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:60