Analysis
-
max time kernel
8s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 11:35
Behavioral task
behavioral1
Sample
msmng2.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
msmng2.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
Family
xworm
Version
5.0
C2
5.182.87.154:7000
aes.plain
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4904-0-0x0000000000070000-0x0000000000290000-memory.dmp family_xworm behavioral2/memory/212-278-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4904-0-0x0000000000070000-0x0000000000290000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe 4904 msmng2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4904 msmng2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\msmng2.exe"C:\Users\Admin\AppData\Local\Temp\msmng2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:212
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵PID:2336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'3⤵PID:3304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msmgnr.exe'3⤵PID:3404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msmgnr.exe'3⤵PID:5008
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5036