Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 13:45
Behavioral task
behavioral1
Sample
msmng2.exe
Resource
win7-20231215-en
General
-
Target
msmng2.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
xworm
5.0
5.182.87.154:7000
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2268-0-0x0000000000D30000-0x0000000000F50000-memory.dmp family_xworm behavioral2/memory/464-278-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2268-0-0x0000000000D30000-0x0000000000F50000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 464 2268 msmng2.exe 98 -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 2268 msmng2.exe 744 powershell.exe 744 powershell.exe 3436 powershell.exe 3436 powershell.exe 3336 powershell.exe 3336 powershell.exe 2844 powershell.exe 2844 powershell.exe 464 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2268 msmng2.exe Token: SeDebugPrivilege 464 MSBuild.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 3336 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2268 msmng2.exe 2268 msmng2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2268 msmng2.exe 2268 msmng2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 464 MSBuild.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2268 wrote to memory of 728 2268 msmng2.exe 99 PID 2268 wrote to memory of 728 2268 msmng2.exe 99 PID 2268 wrote to memory of 728 2268 msmng2.exe 99 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 2268 wrote to memory of 464 2268 msmng2.exe 98 PID 464 wrote to memory of 744 464 MSBuild.exe 101 PID 464 wrote to memory of 744 464 MSBuild.exe 101 PID 464 wrote to memory of 744 464 MSBuild.exe 101 PID 464 wrote to memory of 3436 464 MSBuild.exe 103 PID 464 wrote to memory of 3436 464 MSBuild.exe 103 PID 464 wrote to memory of 3436 464 MSBuild.exe 103 PID 464 wrote to memory of 3336 464 MSBuild.exe 105 PID 464 wrote to memory of 3336 464 MSBuild.exe 105 PID 464 wrote to memory of 3336 464 MSBuild.exe 105 PID 464 wrote to memory of 2844 464 MSBuild.exe 106 PID 464 wrote to memory of 2844 464 MSBuild.exe 106 PID 464 wrote to memory of 2844 464 MSBuild.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\msmng2.exe"C:\Users\Admin\AppData\Local\Temp\msmng2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:728
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5684ba61f1fe7f7ab802cbe0b250b4d0b
SHA1dc957fb6af7dfefe937076bbc4c06e24eec1aaa5
SHA256a5b5a9bb04fbc657b35a8f2a45d4b402025bd7390b6829067c084ecb2423d90b
SHA51225d15487db65f16e24a5c6188cfd93e2df01e10ace90dd4b5dccd91d1872af935cae97c93376cb77a21c3806ad560d0063d4b873c3a9b886098c495c85cd4e09
-
Filesize
18KB
MD579dc697523b39166bff855089d67c787
SHA1fe140b20d332e7adc4f7700f80ff27f8b0b50f12
SHA256e140dc26f19fc9c9a1d7a7129df984cea6f82a551a75fa54fc91565043d3f170
SHA512f63a0fe6a01309b65961b223f26fd8d4838e516252a35c705e3412589df06a2d8244376cb3d76618840d43b515bbde45ee23c1f831803a0d83139ef31964e68d
-
Filesize
18KB
MD5f807eff2f19422d4132b7fe0a8ac87dd
SHA1133cf9966ec60b47fa654ca62c4ecd6b477b9ce3
SHA2568c998fe41a4d20b4ac3732a9b9fe07e4be0224f8e3c9f1a718fa44a2845df0f3
SHA51290595d6e2eed93b5b50f5efff7c34d4172026129c6b2f7d1e185d606da359ad2874821e7c018506c7adc267714e1e8a145ed8a3540150d6eac4a72e9ba771825
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82