Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 23:12

General

  • Target

    rundll64.exe

  • Size

    13.6MB

  • MD5

    c012a0d5bcbf9404db18a5bd4d023da2

  • SHA1

    023e94bb24f658c9eb1ebf2c4aa9942d9f85f5e9

  • SHA256

    4b76ffab85b21d682a381fc59026c643b334d68bc46c43499c33da90070bcf47

  • SHA512

    9954733c34d1c413e131b4249304c3eb130ff2e6d7a5cf30cd95fbfab4f1d7d0de0981b5a4c8a22f4a9ba663fcc00ed77a4c046eeae9b1db49fc302a5ffbea4e

  • SSDEEP

    196608:Jw9X+yc8n5dHoIvymwddlIyNDggUgnwRz78MaPVMu0zZiT4RGMijcqJV5ppf18JD:JwAyF5dL5grMzYRPxkKZjD3zilK0

Malware Config

Extracted

Family

xworm

Version

5.0

C2

comes-bennett.gl.at.ply.gg:43941

Mutex

RHFq4tV0h4KMFvrJ

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Extracted

Family

xworm

C2

lower-fisheries.gl.at.ply.gg:45093

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6840931665:AAGv7v7rX37B-ecRdyZwX93qMTKObEsmQ5o/sendMessage?chat_id=6840931665

Signatures

  • Detect Xworm Payload 5 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rundll64.exe
    "C:\Users\Admin\AppData\Local\Temp\rundll64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\MalcoreDesktopAgent.exe
      "C:\Users\Admin\MalcoreDesktopAgent.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DiscordUpdate" /tr "C:\ProgramData\DiscordUpdate"
        3⤵
        • Creates scheduled task(s)
        PID:2800
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /f /tn "DiscordUpdate"
        3⤵
          PID:1152
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE292.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:996
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:2592
      • C:\Users\Admin\rundll32.exe
        "C:\Users\Admin\rundll32.exe"
        2⤵
        • Executes dropped EXE
        PID:2648
      • C:\Users\Admin\injector.exe
        "C:\Users\Admin\injector.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2016
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {D6E1DD09-665C-428F-B485-F9AD9BF42270} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\ProgramData\DiscordUpdate
        C:\ProgramData\DiscordUpdate
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpE292.tmp.bat

      Filesize

      152B

      MD5

      11b40b7b6b5154ba13a40023f72ac7e8

      SHA1

      e4c547f2ece0efa1cc53adddc4e715b993afdb4b

      SHA256

      7922a0138031923f9786712bb6bc308ffed7573574b201f6664795361e37107f

      SHA512

      6b3f98bc00a069a6bd8b98149dae2cf11c6cc0887f9b4b4589195fd8ef4544b923206020e5680250394016d2a59c501818877bd01b420268029152a95fdc1033

    • C:\Users\Admin\MalcoreDesktopAgent.exe

      Filesize

      252KB

      MD5

      448000229f6de57909b72b61a2f5c129

      SHA1

      c9f59ba2634c515d2135b980c4c4d65c5940f5ce

      SHA256

      5a1feccf46313f7891194f8ce1746636901df99c8d536a8c6dacd81132a1a24a

      SHA512

      a68beb3bea313c9617135a5f01d2268a33354afca73427b5a4387c451afd49b085197e9c34b8afefbf5e1216a1b47b673f13b485a0b0ff104a3a56219eb7c4e1

    • C:\Users\Admin\injector.exe

      Filesize

      71KB

      MD5

      7d36a616a7569549a43b4275812eb2ab

      SHA1

      57411ea43664adb04d04a4a4205f19e20b33ef8a

      SHA256

      452c73c2996ff6fffc37b9e58aff5956de0557e83022e8c6fbb01d4e8b87310b

      SHA512

      f42123481d599490fa5893e2ccd7ec4856400efaae8d5e0f8e41a82f2d5f77a34bfbb66e1b0edbde8c0490ce924feada5cf69ab9ebb10df2564c1b9964eb3722

    • C:\Users\Admin\rundll32.exe

      Filesize

      3.8MB

      MD5

      443c29294547563a841d8552407adc8d

      SHA1

      c0931e05384859f96219240a2e6b83554ff82df5

      SHA256

      c60153e6c14d48b99a950ffd31b0253b76750e2ac512654d302b15c6b1113aab

      SHA512

      93f7f7f97a1cc3021e575249eb02f3844f7ee4d5b41541977e19b756c83caef0c87b4d092d1e60555749761c22c31efa686619e05b14a4846eea066d654cdb3d

    • C:\Users\Admin\rundll32.exe

      Filesize

      4.3MB

      MD5

      26d5dd4bb3d94bf607eb4b7dfe647bc6

      SHA1

      1e120593b62ef02800b8930a9ae7ecdb22c9dede

      SHA256

      154b3bcd525ea78f6482723c1cabb2cf46b0f2ae7c6f52a4acbe65a42cf094e1

      SHA512

      67a9dfb7e0856a067c5973269bfb688862c66fd7003daf87b92c4641ddc83a25561717ed2a31d890f3ff0d10dd149d319170a7b419c3b356def3e299d3e70653

    • C:\Users\Admin\rundll32.exe

      Filesize

      739KB

      MD5

      52ccbe0d0fd44b841449e6b20fd24d9b

      SHA1

      a884ce9cdc8f8247cc1263d39f1919922664328d

      SHA256

      58077c6f0889643b0036471ba2c406f768b073534e95449ad9c6b003c3fb9315

      SHA512

      6cba2a69dd054f5d3a48681d070affd990e0e5fb03d0c03baac4e60486b32bc2104b34847bfa063fd5d77791ad27433007891cf1d920af77af3fcdfe4c56f2ba

    • \Users\Admin\rundll32.exe

      Filesize

      3.9MB

      MD5

      386630bed7f65f6a3b193237234c9917

      SHA1

      283aca025b7d7bd7a07e08cf11dddb149897d8ba

      SHA256

      a8a3697f91a2110f38f937f868db1f3d4c196e024bd54aa6a19ee378cf707a44

      SHA512

      f5da5fb1be16a4a6f0339123556a472251a80353c3ffacb2f025af42f6407e872f6b2546411474a35115431653ce3fae67e5bfdd25a5ea221487536a87e86f2e

    • \Users\Admin\rundll32.exe

      Filesize

      3.4MB

      MD5

      83c61debb1d90465e22bbee60258e59e

      SHA1

      18ccfe3df7512d29468a02c4698f55b9ee45aee4

      SHA256

      de9e6838e0c50986bb36aabd17d19fab89be04a342707e5eda88d16729779122

      SHA512

      505f344a5746799487298d78af8e0169c836a3f1d496cc7344cd4f57973ad3b0e11a9d519ac170482c727312a92efa334e412cdcb967f69cf75bd4bb148c904e

    • \Users\Admin\rundll32.exe

      Filesize

      668KB

      MD5

      e14fce42101a6a23553689a732accf19

      SHA1

      61b7f9f6d2d7e3923b0bdc35dc42a3913b74f467

      SHA256

      af71da5ed500caae9b371105f09cd3ff21a229ff5e50c88846bffd143fd5289e

      SHA512

      459f44b3cc90394a61fd43eb5911317b1d0c4354ca29a65078cddc94059816c6b4356a2184804a5a88d2a8b17dcdb9709fc4c1debf0501f73605fffbd0e110af

    • memory/1440-50-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/1440-49-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/1440-48-0x0000000000BF0000-0x0000000000C36000-memory.dmp

      Filesize

      280KB

    • memory/2016-38-0x0000000000530000-0x00000000005B0000-memory.dmp

      Filesize

      512KB

    • memory/2016-26-0x0000000001380000-0x0000000001398000-memory.dmp

      Filesize

      96KB

    • memory/2016-43-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2016-25-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2648-36-0x0000000140000000-0x0000000140D4C000-memory.dmp

      Filesize

      13.3MB

    • memory/2648-28-0x0000000002EE0000-0x0000000005B95000-memory.dmp

      Filesize

      44.7MB

    • memory/2648-24-0x0000000140000000-0x0000000140D4C000-memory.dmp

      Filesize

      13.3MB

    • memory/2972-1-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2972-23-0x0000000140000000-0x0000000140D4C000-memory.dmp

      Filesize

      13.3MB

    • memory/2972-27-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2972-19-0x0000000140000000-0x0000000140D4C000-memory.dmp

      Filesize

      13.3MB

    • memory/2972-0-0x0000000001260000-0x0000000002004000-memory.dmp

      Filesize

      13.6MB

    • memory/3060-37-0x000000001B1B0000-0x000000001B230000-memory.dmp

      Filesize

      512KB

    • memory/3060-42-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/3060-44-0x000000001B1B0000-0x000000001B230000-memory.dmp

      Filesize

      512KB

    • memory/3060-8-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB

    • memory/3060-7-0x0000000000F50000-0x0000000000F96000-memory.dmp

      Filesize

      280KB

    • memory/3060-61-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

      Filesize

      9.9MB