Analysis
-
max time kernel
129s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
msfiler.exe
Resource
win7-20231215-en
General
-
Target
msfiler.exe
-
Size
419KB
-
MD5
8a716466aa6f2d425ec09770626e8e54
-
SHA1
62fb757ea5098651331f91c1664db9fe46b21879
-
SHA256
585d1fb4f288974b683c5abfb10c97d7d2ae3f59c2bcfd78ba272e3be2cd7815
-
SHA512
54f11067e400347834689b4532ae53b00ec96a3ca90a2c21de27942f4ca30306fdda0522c1a3a4cde047ad650162e2d8313205220acaab4cc60e010965690940
-
SSDEEP
6144:QTCsE3O4yuS5O0RBOInaCa6G6ypdf4Bf7e/DnjBeq04fVXOUvE0CGsSE9BLM:2E3O5uOO0mInnGZCTS84fZLtw
Malware Config
Extracted
xworm
5.0
5.182.87.154:7000
VMFidhoqn75fm5lJ
-
Install_directory
%Temp%
-
install_file
mdnsresp.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/memory/2864-10-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2864-9-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2864-13-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2864-17-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2864-15-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2736-25-0x0000000001DB0000-0x0000000001DF0000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdnsresp.lnk msfiler.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdnsresp.lnk msfiler.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 msfiler.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 536 set thread context of 2864 536 msfiler.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2736 powershell.exe 2640 powershell.exe 2948 powershell.exe 752 powershell.exe 2172 powershell.exe 2864 msfiler.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 536 msfiler.exe Token: SeDebugPrivilege 2864 msfiler.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 msfiler.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 536 wrote to memory of 2736 536 msfiler.exe 28 PID 536 wrote to memory of 2736 536 msfiler.exe 28 PID 536 wrote to memory of 2736 536 msfiler.exe 28 PID 536 wrote to memory of 2736 536 msfiler.exe 28 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 536 wrote to memory of 2864 536 msfiler.exe 30 PID 2864 wrote to memory of 2640 2864 msfiler.exe 32 PID 2864 wrote to memory of 2640 2864 msfiler.exe 32 PID 2864 wrote to memory of 2640 2864 msfiler.exe 32 PID 2864 wrote to memory of 2640 2864 msfiler.exe 32 PID 2864 wrote to memory of 2948 2864 msfiler.exe 34 PID 2864 wrote to memory of 2948 2864 msfiler.exe 34 PID 2864 wrote to memory of 2948 2864 msfiler.exe 34 PID 2864 wrote to memory of 2948 2864 msfiler.exe 34 PID 2864 wrote to memory of 752 2864 msfiler.exe 36 PID 2864 wrote to memory of 752 2864 msfiler.exe 36 PID 2864 wrote to memory of 752 2864 msfiler.exe 36 PID 2864 wrote to memory of 752 2864 msfiler.exe 36 PID 2864 wrote to memory of 2172 2864 msfiler.exe 37 PID 2864 wrote to memory of 2172 2864 msfiler.exe 37 PID 2864 wrote to memory of 2172 2864 msfiler.exe 37 PID 2864 wrote to memory of 2172 2864 msfiler.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\msfiler.exe"C:\Users\Admin\AppData\Local\Temp\msfiler.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAbQBzAGYAaQBsAGUAcgAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAbQBzAGYAaQBsAGUAcgAuAGUAeABlADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\msfiler.exeC:\Users\Admin\AppData\Local\Temp\msfiler.exe2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msfiler.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msfiler.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\mdnsresp.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mdnsresp.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5529ceb853a543c021a423ebe4efbc89d
SHA1eae154750e42d8c8e5a30991ad66ee43eedc02b5
SHA25659bf519527a0995b0cda47434fef97803917a4fa6ac94cdb9171bc872bf7920e
SHA512b862ba61dec087f8b324048507c0365117ca85e79bfd1b192b50deebbdbeee4be75d4fccd5bb867e70db3b125151bf48d476bc7f512fb6a8aac5cbf36824dbd6
-
Filesize
234KB
MD5fa2f5b70ae3d3c4b9dfec81467ea06ea
SHA1f9e11ae2fd6e5454322568728119e7741409768c
SHA2564664064ae88131fd4e92a5454d08dd4ee9d293895f468ba2ac633a6aceb1f6c2
SHA512ea55b98d25edbc464d6045b5c14ee95a9f2376153a7a3b982a80c9b15368d3f5213e43d304f742155690a71fc5b723403e2e26728f624e4f17628518326a740b