Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 12:44
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
windows7-x64
9 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
Family
xworm
Version
5.0
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2952-0-0x00000000009A0000-0x0000000000BC0000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2952-0-0x00000000009A0000-0x0000000000BC0000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe 2952 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2952 file.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2952 file.exe 2952 file.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2952 file.exe 2952 file.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1212 2952 file.exe 31 PID 2952 wrote to memory of 1212 2952 file.exe 31 PID 2952 wrote to memory of 1212 2952 file.exe 31 PID 2952 wrote to memory of 1212 2952 file.exe 31 PID 2952 wrote to memory of 1008 2952 file.exe 32 PID 2952 wrote to memory of 1008 2952 file.exe 32 PID 2952 wrote to memory of 1008 2952 file.exe 32 PID 2952 wrote to memory of 1008 2952 file.exe 32 PID 2952 wrote to memory of 2220 2952 file.exe 33 PID 2952 wrote to memory of 2220 2952 file.exe 33 PID 2952 wrote to memory of 2220 2952 file.exe 33 PID 2952 wrote to memory of 2220 2952 file.exe 33 PID 2952 wrote to memory of 2984 2952 file.exe 34 PID 2952 wrote to memory of 2984 2952 file.exe 34 PID 2952 wrote to memory of 2984 2952 file.exe 34 PID 2952 wrote to memory of 2984 2952 file.exe 34 PID 2952 wrote to memory of 684 2952 file.exe 35 PID 2952 wrote to memory of 684 2952 file.exe 35 PID 2952 wrote to memory of 684 2952 file.exe 35 PID 2952 wrote to memory of 684 2952 file.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:1212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:1008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:2220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵PID:684
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2628