Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240226-en
General
-
Target
file.exe
-
Size
419KB
-
MD5
8a716466aa6f2d425ec09770626e8e54
-
SHA1
62fb757ea5098651331f91c1664db9fe46b21879
-
SHA256
585d1fb4f288974b683c5abfb10c97d7d2ae3f59c2bcfd78ba272e3be2cd7815
-
SHA512
54f11067e400347834689b4532ae53b00ec96a3ca90a2c21de27942f4ca30306fdda0522c1a3a4cde047ad650162e2d8313205220acaab4cc60e010965690940
-
SSDEEP
6144:QTCsE3O4yuS5O0RBOInaCa6G6ypdf4Bf7e/DnjBeq04fVXOUvE0CGsSE9BLM:2E3O5uOO0mInnGZCTS84fZLtw
Malware Config
Extracted
xworm
5.0
5.182.87.154:7000
VMFidhoqn75fm5lJ
-
Install_directory
%Temp%
-
install_file
mdnsresp.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/3024-11-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/3024-13-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/3024-17-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/3024-19-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/3024-21-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/2868-3-0x00000000004E0000-0x0000000000528000-memory.dmp family_purelog_stealer -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdnsresp.lnk file.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdnsresp.lnk file.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 3024 2868 file.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2096 powershell.exe 2556 powershell.exe 1872 powershell.exe 2388 powershell.exe 1692 powershell.exe 3024 file.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2868 file.exe Token: SeDebugPrivilege 3024 file.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 1692 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 file.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2096 2868 file.exe 28 PID 2868 wrote to memory of 2096 2868 file.exe 28 PID 2868 wrote to memory of 2096 2868 file.exe 28 PID 2868 wrote to memory of 2096 2868 file.exe 28 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 2868 wrote to memory of 3024 2868 file.exe 30 PID 3024 wrote to memory of 2556 3024 file.exe 31 PID 3024 wrote to memory of 2556 3024 file.exe 31 PID 3024 wrote to memory of 2556 3024 file.exe 31 PID 3024 wrote to memory of 2556 3024 file.exe 31 PID 3024 wrote to memory of 1872 3024 file.exe 33 PID 3024 wrote to memory of 1872 3024 file.exe 33 PID 3024 wrote to memory of 1872 3024 file.exe 33 PID 3024 wrote to memory of 1872 3024 file.exe 33 PID 3024 wrote to memory of 2388 3024 file.exe 35 PID 3024 wrote to memory of 2388 3024 file.exe 35 PID 3024 wrote to memory of 2388 3024 file.exe 35 PID 3024 wrote to memory of 2388 3024 file.exe 35 PID 3024 wrote to memory of 1692 3024 file.exe 37 PID 3024 wrote to memory of 1692 3024 file.exe 37 PID 3024 wrote to memory of 1692 3024 file.exe 37 PID 3024 wrote to memory of 1692 3024 file.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAZgBpAGwAZQAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAZgBpAGwAZQAuAGUAeABlADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\file.exeC:\Users\Admin\AppData\Local\Temp\file.exe2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\file.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\mdnsresp.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mdnsresp.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58bd931987585d4f37ffe0bdb31763f77
SHA1a435b95b8e33e097c5360643ad5d05c1328b9f9c
SHA256e0f18b32bb68fc06417c206a94c049bd7f6a5165ff8a730bb7eb2a0972cd53ac
SHA51204f624717fa7775aa329ca0ef692bfd11fb2ad5894793a79b37ed8dce1cd4fcb6aff2b2cd5cf82106b7a4de7d965f5d1986e181e8fdbcf871e2d3090d92339fa
-
Filesize
419KB
MD58a716466aa6f2d425ec09770626e8e54
SHA162fb757ea5098651331f91c1664db9fe46b21879
SHA256585d1fb4f288974b683c5abfb10c97d7d2ae3f59c2bcfd78ba272e3be2cd7815
SHA51254f11067e400347834689b4532ae53b00ec96a3ca90a2c21de27942f4ca30306fdda0522c1a3a4cde047ad650162e2d8313205220acaab4cc60e010965690940