Analysis

  • max time kernel
    67s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 15:56

General

  • Target

    NerestPc.exe

  • Size

    2.8MB

  • MD5

    9db30dedeed5a5d3b7bee80b5bdbbc46

  • SHA1

    7cf71e9c9b433d269050011f9e76e70f083282d6

  • SHA256

    047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a

  • SHA512

    f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02

  • SSDEEP

    49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    wininit.exe

  • pastebin_url

    https://pastebin.com/raw/7MyeMz9p

  • telegram

    https://api.telegram.org/bot6924062419:AAH4gnyXxdFAI3v9Q7dkCjzPoXbFknr155o/sendMessage?chat_id=6986550905

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 4 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NerestPc.exe
    "C:\Users\Admin\AppData\Local\Temp\NerestPc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Roaming\neresthelper.exe
      "C:\Users\Admin\AppData\Roaming\neresthelper.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\system32\CMD.exe
        "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System Update" /tr "C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System Update" /tr "C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2440
      • C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe
        "C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1908
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'f4bnmzy2.qnf.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2496
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\wininit.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:568
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wininit.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1968
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wininit" /tr "C:\Users\Admin\AppData\Local\Temp\wininit.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2020
        • C:\Users\Admin\AppData\Local\Temp\mnqtzp.exe
          "C:\Users\Admin\AppData\Local\Temp\mnqtzp.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of AdjustPrivilegeToken
          PID:2640
    • C:\Users\Admin\AppData\Roaming\NerestPC.exe
      "C:\Users\Admin\AppData\Roaming\NerestPC.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2648
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {85F7B5B9-E0D7-4731-AFD3-2CCFF2B08CF4} S-1-5-21-406356229-2805545415-1236085040-1000:IKJSPGIM\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\wininit.exe
      C:\Users\Admin\AppData\Local\Temp\wininit.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe

    Filesize

    8KB

    MD5

    c8950630ba05cf7b9b9d0145153eeff2

    SHA1

    ee6ebbc4d199330368a86671eea6ecf9ff2bf534

    SHA256

    21f7349415c1e0c8808c236168ea0f1e33224930a74b95d24814280d3bf175ea

    SHA512

    4c73808e2b52bbf8fff02a53eaebb28621db21e3e64e402e74a062e9abd5d0088b72e7993e85b1e3b4277067a3994c42650f65c60e0971fb9386208bb7334c16

  • C:\ProgramData\Microsoft\Windows\Templates\f4bnmzy2.qnf.exe

    Filesize

    60KB

    MD5

    defabd9c517324d47136839fd95f5e36

    SHA1

    939476feb1c30d693f2d986887491ba32f273590

    SHA256

    af63227cb6a4fe78c3a4d1483f158cfe67e076a8ff2c3e9f7d801ca65536543c

    SHA512

    ae031414e0e6a5de61d366ea1c5f04754502f5d6c781c3fea8dd2ff697c5c09c8df93903441081afc84ddb4fdd935d0a069cbae156a3027d1c248b032c1d0453

  • C:\Users\Admin\AppData\Local\Temp\CabA7D5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA7F8.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\mnqtzp.exe

    Filesize

    17KB

    MD5

    eda44bffd57ead6f12a99a15f7089c37

    SHA1

    dbaf2ab7898777079ef8984338c91d4d5e188cd0

    SHA256

    821e8afdda6cd8833ccf5e5548b787cbc48eaeba0b8e7fc7962494ddc79e10d6

    SHA512

    e6a13b593ea41c867678c91ea6a90774af9aeff653f705aa8549ea01cf278271dcc6be9e204e431d5061e89651906b86318a7497a3943b242b5df1b6cea3ea14

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    3bf2062a5d0f75ce17cbd13c25c54c63

    SHA1

    50fec4e6e4e0e206c62390da3fb79d50ba256f9f

    SHA256

    c5f83739e3541c5c726efffd4eecdb041cd0186a6e043cb6306098451632f11c

    SHA512

    6fd93e9dd8929abc4678e6e441dd04cb124bff31bf4dd6ecc728110b23efc0dc9c73fafbd3ac2665a5a73d9ae1998191c41c78e879b5e56d4c0f5240c5ed65d6

  • C:\Users\Admin\AppData\Roaming\NerestPC.exe

    Filesize

    2.2MB

    MD5

    4d979d5c69dbce73c543ac41ae850703

    SHA1

    c68e35fca219b31093cb34d135aef038d76a0832

    SHA256

    6c4d1fb30e1cbb7dec8d38ae27226b805ec0d77aa046b87724c56bc305913eed

    SHA512

    5c543c610c28a71438990d42882e2dee9714a71db697b01491bb0fc2e5f2ce68e69a97eed464a4f7a51b50b73a09c9c7f3c907e53e3728e46f2698be52fe8750

  • C:\Users\Admin\AppData\Roaming\NerestPC.exe

    Filesize

    2.2MB

    MD5

    107c5610fe7c95eca374e612486fc9bd

    SHA1

    f3a2493d16c4e5a509ea6520851fe06f81a68cbe

    SHA256

    297a40d7ec75b78e96198d9c5e77bd520b11d2a3614562926cce3604a79547d5

    SHA512

    1a9a3cba1977d99e0ddff23b7d8b269b9f4eae9593753c838b47014addb99e978b930e860375a2757ada76a9a26186597cb9a753fd6f32b8bd9076e4eecc5c5f

  • C:\Users\Admin\AppData\Roaming\neresthelper.exe

    Filesize

    73KB

    MD5

    045d0a1e3f259034fc563c3aa7efac51

    SHA1

    7ad761e506d74178983f2fce002441709f6554ce

    SHA256

    22286ac2e488532123af91d73b67d1a364dfafbc39ede033ba19ae68a38510f1

    SHA512

    6fba3bf3bee7f8667cae3560e9d2339cb73c05591c6441eddf81e5aea5478089e3ed1d88c731518bced167c47fc31ac7290e6f35e9bec20d49c30742007a7e77

  • \Users\Admin\AppData\Roaming\NerestPC.exe

    Filesize

    2.7MB

    MD5

    90bfd119960b86518254278ed2a71814

    SHA1

    4616df24481d165ce54475495a5510f8be4c31e4

    SHA256

    2f3d10d69bd1139a49aab91e8caf9a3dd452a464413a386a04380a5566d16bf8

    SHA512

    7fd0f01096076419dd5ff13be232ad67a6933feddaccbccfda697d88012106bc26bac9c617b2854e706d79e706ebfeb33aeb3b61b257d0406836df356613781d

  • \Users\Admin\AppData\Roaming\NerestPC.exe

    Filesize

    304KB

    MD5

    f1f3256fc2ba4dd820358a3e290c7d5f

    SHA1

    f21b53e48a70dca560f30416dd8babaa4b464f14

    SHA256

    7ebb91dc193607430a533560afb6dd4086c2c0cad523574aecdba3e521b68c40

    SHA512

    e288c5fc9c6909a1a09712bb10c5f802b46fd9e79ec3fa0cf5b5c5f0b03f3763185a89da60e39c1116b49cf961d724bfb4e13779ecf861d9671c03d5d96b1fff

  • \Users\Admin\AppData\Roaming\NerestPC.exe

    Filesize

    256KB

    MD5

    15c61f8e548f9a864ea1f56348859754

    SHA1

    b59e04af46382acb26efa882529e360eb82dcfe9

    SHA256

    d0edf4142a58606edd4d6c8b615286485229b234229e79c1f9e1aaf01f8043f9

    SHA512

    c87c0213a956cba9f18548f637f473fd0b5b148592ec18878a70ad0371ac1fa05f179b08e2e82617c213ecbb44d5f2653bdc9f10765965b2d5370484042bdd46

  • memory/568-88-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/568-89-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/568-86-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/568-85-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/568-84-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/568-83-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-18-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/1644-1-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/1644-0-0x0000000000220000-0x00000000004E8000-memory.dmp

    Filesize

    2.8MB

  • memory/1704-146-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/1704-145-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/1704-144-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

    Filesize

    88KB

  • memory/1908-60-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/1908-53-0x0000000001FD0000-0x0000000001FD8000-memory.dmp

    Filesize

    32KB

  • memory/1908-55-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/1908-58-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/1908-54-0x000007FEECCE0000-0x000007FEED67D000-memory.dmp

    Filesize

    9.6MB

  • memory/1908-52-0x000000001B260000-0x000000001B542000-memory.dmp

    Filesize

    2.9MB

  • memory/1908-59-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/1968-101-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/1968-102-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/1968-100-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/1968-99-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/1968-98-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/1968-97-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-14-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2080-7-0x0000000000C00000-0x0000000000C18000-memory.dmp

    Filesize

    96KB

  • memory/2080-40-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2488-45-0x000000001B200000-0x000000001B280000-memory.dmp

    Filesize

    512KB

  • memory/2488-147-0x000000001A690000-0x000000001A69C000-memory.dmp

    Filesize

    48KB

  • memory/2488-75-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2488-41-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2488-87-0x000000001B200000-0x000000001B280000-memory.dmp

    Filesize

    512KB

  • memory/2488-42-0x0000000000800000-0x0000000000816000-memory.dmp

    Filesize

    88KB

  • memory/2496-77-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2496-66-0x000000001B350000-0x000000001B632000-memory.dmp

    Filesize

    2.9MB

  • memory/2496-73-0x0000000002A60000-0x0000000002AE0000-memory.dmp

    Filesize

    512KB

  • memory/2496-70-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2496-76-0x0000000002A60000-0x0000000002AE0000-memory.dmp

    Filesize

    512KB

  • memory/2496-69-0x00000000022E0000-0x00000000022E8000-memory.dmp

    Filesize

    32KB

  • memory/2496-68-0x0000000002A60000-0x0000000002AE0000-memory.dmp

    Filesize

    512KB

  • memory/2496-72-0x000007FEEC340000-0x000007FEECCDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2496-71-0x0000000002A60000-0x0000000002AE0000-memory.dmp

    Filesize

    512KB

  • memory/2648-96-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB

  • memory/2648-95-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB

  • memory/2648-74-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB

  • memory/2648-43-0x000000001C570000-0x000000001C64A000-memory.dmp

    Filesize

    872KB

  • memory/2648-67-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2648-32-0x0000000000810000-0x0000000000811000-memory.dmp

    Filesize

    4KB

  • memory/2648-19-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB

  • memory/2648-17-0x000007FEF50E0000-0x000007FEF5ACC000-memory.dmp

    Filesize

    9.9MB

  • memory/2648-16-0x0000000000090000-0x0000000000340000-memory.dmp

    Filesize

    2.7MB

  • memory/2648-46-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB

  • memory/2648-44-0x000000001CB50000-0x000000001CD62000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-51-0x000000001BF50000-0x000000001BFD0000-memory.dmp

    Filesize

    512KB