Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 13:45
Behavioral task
behavioral1
Sample
msmng2.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
msmng2.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
Family
xworm
Version
5.0
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3000-0-0x0000000000070000-0x0000000000290000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/3000-0-0x0000000000070000-0x0000000000290000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe 3000 msmng2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 msmng2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3000 msmng2.exe 3000 msmng2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3000 msmng2.exe 3000 msmng2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3060 3000 msmng2.exe 31 PID 3000 wrote to memory of 3060 3000 msmng2.exe 31 PID 3000 wrote to memory of 3060 3000 msmng2.exe 31 PID 3000 wrote to memory of 3060 3000 msmng2.exe 31 PID 3000 wrote to memory of 2112 3000 msmng2.exe 33 PID 3000 wrote to memory of 2112 3000 msmng2.exe 33 PID 3000 wrote to memory of 2112 3000 msmng2.exe 33 PID 3000 wrote to memory of 2112 3000 msmng2.exe 33 PID 3000 wrote to memory of 2228 3000 msmng2.exe 34 PID 3000 wrote to memory of 2228 3000 msmng2.exe 34 PID 3000 wrote to memory of 2228 3000 msmng2.exe 34 PID 3000 wrote to memory of 2228 3000 msmng2.exe 34 PID 3000 wrote to memory of 1720 3000 msmng2.exe 35 PID 3000 wrote to memory of 1720 3000 msmng2.exe 35 PID 3000 wrote to memory of 1720 3000 msmng2.exe 35 PID 3000 wrote to memory of 1720 3000 msmng2.exe 35 PID 3000 wrote to memory of 2204 3000 msmng2.exe 36 PID 3000 wrote to memory of 2204 3000 msmng2.exe 36 PID 3000 wrote to memory of 2204 3000 msmng2.exe 36 PID 3000 wrote to memory of 2204 3000 msmng2.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\msmng2.exe"C:\Users\Admin\AppData\Local\Temp\msmng2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:3060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:2228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:1720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:2204
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2776