Resubmissions

20-04-2024 17:13

240420-vrrwwadh2z 10

12-03-2024 21:36

240312-1f3f5adc57 10

10-03-2024 04:41

240310-fbmjwscd28 10

10-03-2024 04:40

240310-fan2bscc93 10

10-03-2024 04:38

240310-e9wd1scc82 10

09-03-2024 07:38

240309-jghpnsdh88 10

Analysis

  • max time kernel
    120s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 04:40

General

  • Target

    Reaper/Reaper/Reaper.exe

  • Size

    8.3MB

  • MD5

    79d145e3962e71bf725d15b4c0261dac

  • SHA1

    bc9d7a5a347fcefe3b3b81136e83af294bd489f4

  • SHA256

    0ca306be254d1b3aff02ae559e5649e9f0bb10367f692e132d7da39e6860448d

  • SHA512

    2fc3cd1b4542de7313ffea8fc16132df9c305c9ca847d4754e3a645c274933b4dd9682b4dd2585c62e5b8b2307e296fb64e32b758222123bb5c901a95ba0b6df

  • SSDEEP

    196608:wfojS3EHCg1OgwII+XN6h5BOpEAyRHtt7fEiLrArrIx2j1:wojS3E1zg+XN05UpEAcHtt7MiorGg

Malware Config

Extracted

Family

xworm

C2

l838.ddns.net:3232

Attributes
  • Install_directory

    %AppData%

  • install_file

    Runtime Broker.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Reaper\Reaper\Reaper.exe
    "C:\Users\Admin\AppData\Local\Temp\Reaper\Reaper\Reaper.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAZQB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAdwBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AYwB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHMAbABqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Users\Admin\AppData\Local\Temp\Reaper.exe
      "C:\Users\Admin\AppData\Local\Temp\Reaper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1296
    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
        "C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1592
    • C:\Windows\Runtime broker.exe
      "C:\Windows\Runtime broker.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Runtime broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:684
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Runtime Broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:560
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime Broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2620
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CF4C5088-D11E-4D18-852C-D503DF91BFD5} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]
    1⤵
      PID:2504

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\api-ms-win-core-file-l1-2-0.dll
      Filesize

      13KB

      MD5

      c0a08223267dca75cc2b59d44d58f7bd

      SHA1

      bc78b24084e11a8a81976f65b2c6ac51fee0ad6d

      SHA256

      7f7aa25f8cf3a6ad223075158ffadecdbb2113f199e78bd96c90e59575c02533

      SHA512

      ce78534e2f022806093547dca1a46995ac9677bc05aaa41718a91b2b68a8efd30e0612a721c4e8e0a4e5abce558bb7a6e24a5430b74885d770a5119293b3b145

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\api-ms-win-core-localization-l1-2-0.dll
      Filesize

      15KB

      MD5

      946b6834271543c2bf51ec8844aa5253

      SHA1

      69017dadf33e099da04350c2733479759d5a8cae

      SHA256

      9d4caef81cfa17a92d17f4f412bec75f02c3f36c746c3736374f1bc51ce17154

      SHA512

      b8bf7d3cac6620bb6985e374b7c676ab69401c552d15ad80e527bc791d8da73eea5c5f78cf6da6a20640ce5a63349370c30e2560a0daae8ce4382f1ad39d939c

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\api-ms-win-core-processthreads-l1-1-1.dll
      Filesize

      13KB

      MD5

      4efc47ca2d7ccd126d48ef7d1215cb3b

      SHA1

      1071b4606191d294851eb61b3674cd65e5b7aeca

      SHA256

      f898b6033ed993a1d83d095befa6f045e8823d13469000d755496ec2ff5cc50f

      SHA512

      c8bcb3e890d10ff5902b233bce8f1ce277e0bf9fcd1f38f7f91f0d2f6a9b3d039016914d44cd860ea8a05d50af048fb2f60e5848b3fdf056785c7cf8694e0521

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\api-ms-win-core-timezone-l1-1-0.dll
      Filesize

      13KB

      MD5

      b47ebdd6d53056c8f47766952ea44d1d

      SHA1

      7e687c1f75205ae7154a03d7a07ad8b2e3962432

      SHA256

      73ceaaa0c05aa62f8629ab074eece8096f2069c772677763c0d85dbf58b06a4d

      SHA512

      c1517a5cf5a58be9d5cc6b35bfb66d63fafdaa18f62f74a29f1d50fb36261676c00eba6c33f4cac545908ec4d998163fc7f8d59397e5ec044a3284efb612b8b7

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\python311.dll
      Filesize

      1.6MB

      MD5

      5792adeab1e4414e0129ce7a228eb8b8

      SHA1

      e9f022e687b6d88d20ee96d9509f82e916b9ee8c

      SHA256

      7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

      SHA512

      c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

    • C:\Users\Admin\AppData\Local\Temp\_MEI25802\ucrtbase.dll
      Filesize

      987KB

      MD5

      a4781a4c41ada12c5420ee2b9bcbfda3

      SHA1

      7c394165fafd176908f38c6c5ffe065751b6a868

      SHA256

      0ef5cc705f0752489ea8f2a79116ca842142cee9f2bbb60ef24e2524b0066a09

      SHA512

      0055a67d02c59d5f63a3d7b56fe934ae56a80fc56e11819de62ae567fca74724ac6bc885bac37cd3f11a7abd243b9990f8edd674becd7b7a4f89a3325ebab104

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W975V7E6W4HR90RV8413.temp
      Filesize

      7KB

      MD5

      3c0213ad8068f99a45abe44e7ffd44a1

      SHA1

      c5299bb251ada52cc104e42a5c463a78445d4005

      SHA256

      c41e149f3a01ba4d6955ee6a7802bfe97038d996185d2f3c06743b508dafbd0c

      SHA512

      db7bc0bb05420751ec683b38a3f063ab121d8efd2e582144b72d2eef255d57a1899b5b56146dd992035a73958099ed701f9ccb405690fe97ab9ae2673f04fe2e

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      512KB

      MD5

      b33445027a7096404499b80221619011

      SHA1

      dbbc4c88fffb4ecddd4db5feb24b5bb28b7a1624

      SHA256

      3dbfab3c01dcdf269e5d14fcb67d55cc69b4cd59c6483a93b975563b66fb1f0a

      SHA512

      d85437901aa03eef9f3605ae93602f1743c671b47fb734248aa4c79d2b0a52aa5bb40861b775dc90fd1b95e495ae077e4ce440296fdca803d40ace45ab3ee2f1

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      162KB

      MD5

      9c844db01390d3062508cf7fff1b199c

      SHA1

      80fc00f8048416eb51ed2b17d6d96a77053cd9bb

      SHA256

      d30ac6db0601df9e61860e45bb786ad44ea5e393fcfb85ccccd717845230d4bb

      SHA512

      2844abbab06423ab5a6982125144f9f16261ffa2466e04850f559c0f4577c9f52e4354e6c79d86ca63a921ab257bff521b71e151431a2500628674ac63608693

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      7.8MB

      MD5

      69d5b0d4d9bb2fbbf840b97c802def96

      SHA1

      18420ab2e4e873c38b5563d7a07517c46525a62b

      SHA256

      08b995c990a12834a7712dd237ea2efa85762ac21bb6752c4453381531061a95

      SHA512

      35c0bdc92630766f857b9770aea12398d8dcc408ff6d2f2a182acab7c3ec9ff0c1cb7bcb243c2c007d62c30e6e595effcd62b2bc046ae98752c2901cc7bacc49

    • C:\Windows\Runtime broker.exe
      Filesize

      80KB

      MD5

      4de8d786d98e91b729b922d851ffb999

      SHA1

      0d201186b3749418cf83f047cda5f3933cae6178

      SHA256

      2b2cccac0931eedf03f91f48d012f993c9577ed554fdef8cd300438510feaff5

      SHA512

      8b921c96dc50a54b34c0ece345c399be84174969e46877d4b105c31931953bcd8879c85c38f19ef6d10da7882e4c10a9834386f7f34a014385d9c70312bbf13c

    • \??\PIPE\srvsvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\Temp\FastColoredTextBox.dll
      Filesize

      323KB

      MD5

      8610f4d3cdc6cc50022feddced9fdaeb

      SHA1

      4b60b87fd696b02d7fce38325c7adfc9e806f650

      SHA256

      ac926c92ccfc3789a5ae571cc4415eb1897d500a79604d8495241c19acdf01b9

      SHA512

      693d1af1f89470eab659b4747fe344836affa0af8485b0c0635e2519815e5a498f4618ea08db9dcf421aac1069a04616046207ee05b9ed66c0a1c4a8f0bddd09

    • \Users\Admin\AppData\Local\Temp\Reaper.exe
      Filesize

      42KB

      MD5

      c7d407dbbe4d83fc37f2fa4f51276c76

      SHA1

      c6f1f596be6a99566d5862a0aa2f16b90eecb05c

      SHA256

      fc69c7aee21fa012c9e9de28e35c20eb9ddf473c0ac0b482faebc203dd97999c

      SHA512

      ed49a442172bdadd6f91db48db3003c5cb749868e9c40a90e8f6b65cdf4b6899d0132cfd70fb08a248412118353d0b4477606385244b90e0883ecdda213403c5

    • \Users\Admin\AppData\Local\Temp\_MEI25802\api-ms-win-core-file-l2-1-0.dll
      Filesize

      13KB

      MD5

      756d1bce2c2fc7e527e48247fd8b3ef4

      SHA1

      66b26444d249277bbaed0d7f487618795fe91ef4

      SHA256

      11a86edc5ca1d6a83c1d8709f8c3e69d9a1ff763ba85fecd49adb6647ba0e9a5

      SHA512

      78e5bb42ce8cff66f0e58d865faed881d1b9214ca1470276beeb0a7810d5926776e0121f5dbbd7a7f01d0b5ed0a8c0ec57112fcd6fdd45d7a19f39311a2469ac

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      6.5MB

      MD5

      68a51f208ae8c35e400c05cc7edab0d2

      SHA1

      3b7cdc5042364b031d1ade538ebb3ef1dd9fab3b

      SHA256

      907d27ea1b4fa5ceb930f82ad4f2fe6ca83fe1fbdf33f7b55790cc9290929605

      SHA512

      23f5bfea8d6393695870a3b803239570cd31c695a5c91d17d81d3d97dd9b540d101cfb50cc13cbe77f818639aa3b0bb3076f5c5cf7c662cbcc4dea88ac9fcef5

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      1024KB

      MD5

      02a60da7f2ceeeb96ef888ff5dfb8295

      SHA1

      c5887d94bf63d1f635d92d4a9252165a252c8156

      SHA256

      ddb6921fb3eb9a467134a1d90f7287580bb707720f940cd1642068c98ca3821c

      SHA512

      1098474e05af8a9de734396aa6c38b5a660774987779e0935f62da1cedb709b392b1651fb78f3796b21595ba461d9f3a0a8edda53ca63d4468a4e286264d7337

    • memory/560-207-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/560-205-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/560-209-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB

    • memory/560-210-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/560-206-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/560-204-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB

    • memory/560-211-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB

    • memory/684-195-0x00000000026F0000-0x0000000002770000-memory.dmp
      Filesize

      512KB

    • memory/684-189-0x000000001B2D0000-0x000000001B5B2000-memory.dmp
      Filesize

      2.9MB

    • memory/684-197-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/684-196-0x00000000026F0000-0x0000000002770000-memory.dmp
      Filesize

      512KB

    • memory/684-194-0x00000000026F0000-0x0000000002770000-memory.dmp
      Filesize

      512KB

    • memory/684-193-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/684-192-0x00000000026F0000-0x0000000002770000-memory.dmp
      Filesize

      512KB

    • memory/684-191-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/684-190-0x0000000001E60000-0x0000000001E68000-memory.dmp
      Filesize

      32KB

    • memory/1296-23-0x0000000000D80000-0x0000000000D90000-memory.dmp
      Filesize

      64KB

    • memory/1296-72-0x0000000073BF0000-0x00000000742DE000-memory.dmp
      Filesize

      6.9MB

    • memory/1296-104-0x0000000000D00000-0x0000000000D58000-memory.dmp
      Filesize

      352KB

    • memory/1296-112-0x0000000000B70000-0x0000000000BB0000-memory.dmp
      Filesize

      256KB

    • memory/1296-111-0x0000000000B70000-0x0000000000BB0000-memory.dmp
      Filesize

      256KB

    • memory/1296-180-0x0000000073BF0000-0x00000000742DE000-memory.dmp
      Filesize

      6.9MB

    • memory/1592-108-0x000007FEF3670000-0x000007FEF3C59000-memory.dmp
      Filesize

      5.9MB

    • memory/1744-220-0x0000000002890000-0x0000000002910000-memory.dmp
      Filesize

      512KB

    • memory/1744-221-0x0000000002890000-0x0000000002910000-memory.dmp
      Filesize

      512KB

    • memory/1744-222-0x0000000002890000-0x0000000002910000-memory.dmp
      Filesize

      512KB

    • memory/1744-219-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/1744-223-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/1744-218-0x0000000002890000-0x0000000002910000-memory.dmp
      Filesize

      512KB

    • memory/1744-217-0x000007FEED070000-0x000007FEEDA0D000-memory.dmp
      Filesize

      9.6MB

    • memory/2624-73-0x00000000028A0000-0x00000000028E0000-memory.dmp
      Filesize

      256KB

    • memory/2624-85-0x0000000071C60000-0x000000007220B000-memory.dmp
      Filesize

      5.7MB

    • memory/2624-107-0x0000000071C60000-0x000000007220B000-memory.dmp
      Filesize

      5.7MB

    • memory/2624-106-0x00000000028A0000-0x00000000028E0000-memory.dmp
      Filesize

      256KB

    • memory/2624-113-0x0000000071C60000-0x000000007220B000-memory.dmp
      Filesize

      5.7MB

    • memory/2816-208-0x0000000002130000-0x00000000021B0000-memory.dmp
      Filesize

      512KB

    • memory/2816-181-0x000007FEF5420000-0x000007FEF5E0C000-memory.dmp
      Filesize

      9.9MB

    • memory/2816-83-0x0000000000170000-0x000000000018A000-memory.dmp
      Filesize

      104KB

    • memory/2816-114-0x0000000002130000-0x00000000021B0000-memory.dmp
      Filesize

      512KB

    • memory/2816-105-0x000007FEF5420000-0x000007FEF5E0C000-memory.dmp
      Filesize

      9.9MB

    • memory/2976-177-0x0000000002650000-0x00000000026D0000-memory.dmp
      Filesize

      512KB

    • memory/2976-179-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB

    • memory/2976-182-0x0000000002650000-0x00000000026D0000-memory.dmp
      Filesize

      512KB

    • memory/2976-178-0x0000000002650000-0x00000000026D0000-memory.dmp
      Filesize

      512KB

    • memory/2976-176-0x0000000002650000-0x00000000026D0000-memory.dmp
      Filesize

      512KB

    • memory/2976-175-0x0000000001FD0000-0x0000000001FD8000-memory.dmp
      Filesize

      32KB

    • memory/2976-174-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB

    • memory/2976-173-0x000000001B150000-0x000000001B432000-memory.dmp
      Filesize

      2.9MB

    • memory/2976-183-0x000007FEEDA10000-0x000007FEEE3AD000-memory.dmp
      Filesize

      9.6MB