Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
rundll64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rundll64.exe
Resource
win10v2004-20240226-en
General
-
Target
rundll64.exe
-
Size
13.6MB
-
MD5
c012a0d5bcbf9404db18a5bd4d023da2
-
SHA1
023e94bb24f658c9eb1ebf2c4aa9942d9f85f5e9
-
SHA256
4b76ffab85b21d682a381fc59026c643b334d68bc46c43499c33da90070bcf47
-
SHA512
9954733c34d1c413e131b4249304c3eb130ff2e6d7a5cf30cd95fbfab4f1d7d0de0981b5a4c8a22f4a9ba663fcc00ed77a4c046eeae9b1db49fc302a5ffbea4e
-
SSDEEP
196608:Jw9X+yc8n5dHoIvymwddlIyNDggUgnwRz78MaPVMu0zZiT4RGMijcqJV5ppf18JD:JwAyF5dL5grMzYRPxkKZjD3zilK0
Malware Config
Extracted
xworm
5.0
comes-bennett.gl.at.ply.gg:43941
RHFq4tV0h4KMFvrJ
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Extracted
xworm
lower-fisheries.gl.at.ply.gg:45093
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6840931665:AAGv7v7rX37B-ecRdyZwX93qMTKObEsmQ5o/sendMessage?chat_id=6840931665
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x000c000000012249-5.dat family_xworm behavioral1/memory/3060-7-0x0000000000F50000-0x0000000000F96000-memory.dmp family_xworm behavioral1/files/0x0035000000014701-22.dat family_xworm behavioral1/memory/2016-26-0x0000000001380000-0x0000000001398000-memory.dmp family_xworm behavioral1/memory/1440-48-0x0000000000BF0000-0x0000000000C36000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DiscordUpdate.lnk MalcoreDesktopAgent.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DiscordUpdate.lnk MalcoreDesktopAgent.exe -
Executes dropped EXE 5 IoCs
pid Process 3060 MalcoreDesktopAgent.exe 2648 rundll32.exe 2016 injector.exe 1156 Process not Found 1440 DiscordUpdate -
Loads dropped DLL 2 IoCs
pid Process 2972 rundll64.exe 2972 rundll64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "C:\\ProgramData\\DiscordUpdate" MalcoreDesktopAgent.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2592 timeout.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3060 MalcoreDesktopAgent.exe Token: SeDebugPrivilege 2016 injector.exe Token: SeDebugPrivilege 2016 injector.exe Token: SeDebugPrivilege 3060 MalcoreDesktopAgent.exe Token: SeDebugPrivilege 1440 DiscordUpdate -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3060 2972 rundll64.exe 28 PID 2972 wrote to memory of 3060 2972 rundll64.exe 28 PID 2972 wrote to memory of 3060 2972 rundll64.exe 28 PID 2972 wrote to memory of 2648 2972 rundll64.exe 29 PID 2972 wrote to memory of 2648 2972 rundll64.exe 29 PID 2972 wrote to memory of 2648 2972 rundll64.exe 29 PID 2972 wrote to memory of 2016 2972 rundll64.exe 30 PID 2972 wrote to memory of 2016 2972 rundll64.exe 30 PID 2972 wrote to memory of 2016 2972 rundll64.exe 30 PID 3060 wrote to memory of 2800 3060 MalcoreDesktopAgent.exe 33 PID 3060 wrote to memory of 2800 3060 MalcoreDesktopAgent.exe 33 PID 3060 wrote to memory of 2800 3060 MalcoreDesktopAgent.exe 33 PID 1592 wrote to memory of 1440 1592 taskeng.exe 35 PID 1592 wrote to memory of 1440 1592 taskeng.exe 35 PID 1592 wrote to memory of 1440 1592 taskeng.exe 35 PID 3060 wrote to memory of 1152 3060 MalcoreDesktopAgent.exe 38 PID 3060 wrote to memory of 1152 3060 MalcoreDesktopAgent.exe 38 PID 3060 wrote to memory of 1152 3060 MalcoreDesktopAgent.exe 38 PID 3060 wrote to memory of 996 3060 MalcoreDesktopAgent.exe 40 PID 3060 wrote to memory of 996 3060 MalcoreDesktopAgent.exe 40 PID 3060 wrote to memory of 996 3060 MalcoreDesktopAgent.exe 40 PID 996 wrote to memory of 2592 996 cmd.exe 42 PID 996 wrote to memory of 2592 996 cmd.exe 42 PID 996 wrote to memory of 2592 996 cmd.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rundll64.exe"C:\Users\Admin\AppData\Local\Temp\rundll64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\MalcoreDesktopAgent.exe"C:\Users\Admin\MalcoreDesktopAgent.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DiscordUpdate" /tr "C:\ProgramData\DiscordUpdate"3⤵
- Creates scheduled task(s)
PID:2800
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "DiscordUpdate"3⤵PID:1152
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE292.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2592
-
-
-
-
C:\Users\Admin\rundll32.exe"C:\Users\Admin\rundll32.exe"2⤵
- Executes dropped EXE
PID:2648
-
-
C:\Users\Admin\injector.exe"C:\Users\Admin\injector.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D6E1DD09-665C-428F-B485-F9AD9BF42270} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\ProgramData\DiscordUpdateC:\ProgramData\DiscordUpdate2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD511b40b7b6b5154ba13a40023f72ac7e8
SHA1e4c547f2ece0efa1cc53adddc4e715b993afdb4b
SHA2567922a0138031923f9786712bb6bc308ffed7573574b201f6664795361e37107f
SHA5126b3f98bc00a069a6bd8b98149dae2cf11c6cc0887f9b4b4589195fd8ef4544b923206020e5680250394016d2a59c501818877bd01b420268029152a95fdc1033
-
Filesize
252KB
MD5448000229f6de57909b72b61a2f5c129
SHA1c9f59ba2634c515d2135b980c4c4d65c5940f5ce
SHA2565a1feccf46313f7891194f8ce1746636901df99c8d536a8c6dacd81132a1a24a
SHA512a68beb3bea313c9617135a5f01d2268a33354afca73427b5a4387c451afd49b085197e9c34b8afefbf5e1216a1b47b673f13b485a0b0ff104a3a56219eb7c4e1
-
Filesize
71KB
MD57d36a616a7569549a43b4275812eb2ab
SHA157411ea43664adb04d04a4a4205f19e20b33ef8a
SHA256452c73c2996ff6fffc37b9e58aff5956de0557e83022e8c6fbb01d4e8b87310b
SHA512f42123481d599490fa5893e2ccd7ec4856400efaae8d5e0f8e41a82f2d5f77a34bfbb66e1b0edbde8c0490ce924feada5cf69ab9ebb10df2564c1b9964eb3722
-
Filesize
3.8MB
MD5443c29294547563a841d8552407adc8d
SHA1c0931e05384859f96219240a2e6b83554ff82df5
SHA256c60153e6c14d48b99a950ffd31b0253b76750e2ac512654d302b15c6b1113aab
SHA51293f7f7f97a1cc3021e575249eb02f3844f7ee4d5b41541977e19b756c83caef0c87b4d092d1e60555749761c22c31efa686619e05b14a4846eea066d654cdb3d
-
Filesize
4.3MB
MD526d5dd4bb3d94bf607eb4b7dfe647bc6
SHA11e120593b62ef02800b8930a9ae7ecdb22c9dede
SHA256154b3bcd525ea78f6482723c1cabb2cf46b0f2ae7c6f52a4acbe65a42cf094e1
SHA51267a9dfb7e0856a067c5973269bfb688862c66fd7003daf87b92c4641ddc83a25561717ed2a31d890f3ff0d10dd149d319170a7b419c3b356def3e299d3e70653
-
Filesize
739KB
MD552ccbe0d0fd44b841449e6b20fd24d9b
SHA1a884ce9cdc8f8247cc1263d39f1919922664328d
SHA25658077c6f0889643b0036471ba2c406f768b073534e95449ad9c6b003c3fb9315
SHA5126cba2a69dd054f5d3a48681d070affd990e0e5fb03d0c03baac4e60486b32bc2104b34847bfa063fd5d77791ad27433007891cf1d920af77af3fcdfe4c56f2ba
-
Filesize
3.9MB
MD5386630bed7f65f6a3b193237234c9917
SHA1283aca025b7d7bd7a07e08cf11dddb149897d8ba
SHA256a8a3697f91a2110f38f937f868db1f3d4c196e024bd54aa6a19ee378cf707a44
SHA512f5da5fb1be16a4a6f0339123556a472251a80353c3ffacb2f025af42f6407e872f6b2546411474a35115431653ce3fae67e5bfdd25a5ea221487536a87e86f2e
-
Filesize
3.4MB
MD583c61debb1d90465e22bbee60258e59e
SHA118ccfe3df7512d29468a02c4698f55b9ee45aee4
SHA256de9e6838e0c50986bb36aabd17d19fab89be04a342707e5eda88d16729779122
SHA512505f344a5746799487298d78af8e0169c836a3f1d496cc7344cd4f57973ad3b0e11a9d519ac170482c727312a92efa334e412cdcb967f69cf75bd4bb148c904e
-
Filesize
668KB
MD5e14fce42101a6a23553689a732accf19
SHA161b7f9f6d2d7e3923b0bdc35dc42a3913b74f467
SHA256af71da5ed500caae9b371105f09cd3ff21a229ff5e50c88846bffd143fd5289e
SHA512459f44b3cc90394a61fd43eb5911317b1d0c4354ca29a65078cddc94059816c6b4356a2184804a5a88d2a8b17dcdb9709fc4c1debf0501f73605fffbd0e110af