Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
12/03/2024, 18:41
Behavioral task
behavioral1
Sample
Зака гей.exe
Resource
win10-20240221-en
General
-
Target
Зака гей.exe
-
Size
79KB
-
MD5
6a82ec7dea40692810f389380b656632
-
SHA1
76f0430bb027be8267531bd4c74e5dff8c320209
-
SHA256
071f192d91385241334a3d171871a3a5c48da7283edc155ea059af8a20c5e81d
-
SHA512
7280b1c766657f8e050b7ba43c6a91b368b37868d31483eae455ae684a3d335a4dc82c7999e9c38d1b50730ece2b3e9b1b9e92c86b87b623dac8e07da27772c4
-
SSDEEP
1536:PP8dK6+XEvbwxo3pbmJiUdb6m6Vko3UmO7UIqvpyE:PPt6nJ3pbm8UdblqUmO7UI68E
Malware Config
Extracted
xworm
18.ip.gl.ply.gg:20674
-
Install_directory
%AppData%
-
install_file
system32.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4972-0-0x0000000000030000-0x000000000004A000-memory.dmp family_xworm behavioral1/files/0x000b00000001ac2d-209.dat family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.lnk Зака гей.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.lnk Зака гей.exe -
Executes dropped EXE 2 IoCs
pid Process 1796 system32.exe 3496 system32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\system32 = "C:\\Users\\Admin\\AppData\\Roaming\\system32.exe" Зака гей.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4992 powershell.exe 4992 powershell.exe 4992 powershell.exe 4812 powershell.exe 4812 powershell.exe 4812 powershell.exe 776 powershell.exe 776 powershell.exe 776 powershell.exe 5064 powershell.exe 5064 powershell.exe 5064 powershell.exe 4972 Зака гей.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4972 Зака гей.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeIncreaseQuotaPrivilege 4992 powershell.exe Token: SeSecurityPrivilege 4992 powershell.exe Token: SeTakeOwnershipPrivilege 4992 powershell.exe Token: SeLoadDriverPrivilege 4992 powershell.exe Token: SeSystemProfilePrivilege 4992 powershell.exe Token: SeSystemtimePrivilege 4992 powershell.exe Token: SeProfSingleProcessPrivilege 4992 powershell.exe Token: SeIncBasePriorityPrivilege 4992 powershell.exe Token: SeCreatePagefilePrivilege 4992 powershell.exe Token: SeBackupPrivilege 4992 powershell.exe Token: SeRestorePrivilege 4992 powershell.exe Token: SeShutdownPrivilege 4992 powershell.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeSystemEnvironmentPrivilege 4992 powershell.exe Token: SeRemoteShutdownPrivilege 4992 powershell.exe Token: SeUndockPrivilege 4992 powershell.exe Token: SeManageVolumePrivilege 4992 powershell.exe Token: 33 4992 powershell.exe Token: 34 4992 powershell.exe Token: 35 4992 powershell.exe Token: 36 4992 powershell.exe Token: SeDebugPrivilege 4812 powershell.exe Token: SeIncreaseQuotaPrivilege 4812 powershell.exe Token: SeSecurityPrivilege 4812 powershell.exe Token: SeTakeOwnershipPrivilege 4812 powershell.exe Token: SeLoadDriverPrivilege 4812 powershell.exe Token: SeSystemProfilePrivilege 4812 powershell.exe Token: SeSystemtimePrivilege 4812 powershell.exe Token: SeProfSingleProcessPrivilege 4812 powershell.exe Token: SeIncBasePriorityPrivilege 4812 powershell.exe Token: SeCreatePagefilePrivilege 4812 powershell.exe Token: SeBackupPrivilege 4812 powershell.exe Token: SeRestorePrivilege 4812 powershell.exe Token: SeShutdownPrivilege 4812 powershell.exe Token: SeDebugPrivilege 4812 powershell.exe Token: SeSystemEnvironmentPrivilege 4812 powershell.exe Token: SeRemoteShutdownPrivilege 4812 powershell.exe Token: SeUndockPrivilege 4812 powershell.exe Token: SeManageVolumePrivilege 4812 powershell.exe Token: 33 4812 powershell.exe Token: 34 4812 powershell.exe Token: 35 4812 powershell.exe Token: 36 4812 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeIncreaseQuotaPrivilege 776 powershell.exe Token: SeSecurityPrivilege 776 powershell.exe Token: SeTakeOwnershipPrivilege 776 powershell.exe Token: SeLoadDriverPrivilege 776 powershell.exe Token: SeSystemProfilePrivilege 776 powershell.exe Token: SeSystemtimePrivilege 776 powershell.exe Token: SeProfSingleProcessPrivilege 776 powershell.exe Token: SeIncBasePriorityPrivilege 776 powershell.exe Token: SeCreatePagefilePrivilege 776 powershell.exe Token: SeBackupPrivilege 776 powershell.exe Token: SeRestorePrivilege 776 powershell.exe Token: SeShutdownPrivilege 776 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeSystemEnvironmentPrivilege 776 powershell.exe Token: SeRemoteShutdownPrivilege 776 powershell.exe Token: SeUndockPrivilege 776 powershell.exe Token: SeManageVolumePrivilege 776 powershell.exe Token: 33 776 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4972 Зака гей.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4992 4972 Зака гей.exe 74 PID 4972 wrote to memory of 4992 4972 Зака гей.exe 74 PID 4972 wrote to memory of 4812 4972 Зака гей.exe 77 PID 4972 wrote to memory of 4812 4972 Зака гей.exe 77 PID 4972 wrote to memory of 776 4972 Зака гей.exe 79 PID 4972 wrote to memory of 776 4972 Зака гей.exe 79 PID 4972 wrote to memory of 5064 4972 Зака гей.exe 81 PID 4972 wrote to memory of 5064 4972 Зака гей.exe 81 PID 4972 wrote to memory of 3628 4972 Зака гей.exe 83 PID 4972 wrote to memory of 3628 4972 Зака гей.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Зака гей.exe"C:\Users\Admin\AppData\Local\Temp\Зака гей.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Зака гей.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Зака гей.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\system32.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system32.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system32" /tr "C:\Users\Admin\AppData\Roaming\system32.exe"2⤵
- Creates scheduled task(s)
PID:3628
-
-
C:\Users\Admin\AppData\Roaming\system32.exeC:\Users\Admin\AppData\Roaming\system32.exe1⤵
- Executes dropped EXE
PID:1796
-
C:\Users\Admin\AppData\Roaming\system32.exeC:\Users\Admin\AppData\Roaming\system32.exe1⤵
- Executes dropped EXE
PID:3496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
654B
MD516c5fce5f7230eea11598ec11ed42862
SHA175392d4824706090f5e8907eee1059349c927600
SHA25687ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151
SHA512153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc
-
Filesize
1KB
MD5863f0ab6bacf8fc70c5b94b25539f88b
SHA1dcf20f16bf8bd240b3679cbed8e27badd2d847fd
SHA25669527502619523cbf4d9ae0be99168d4f40e7fef0937b401592268f6640563c2
SHA512c18a20067673a0ab132d045e4c252615b4f7bdd68a8a69899a2b267cf195a666c601fc7ea5afb89db73c4112625595c332f6b9d4d01e54b260031c65a112ad5c
-
Filesize
1KB
MD5e4ed7efee5b3d2b7efac1534ec1eeb8c
SHA1803f054749f3a5daabde2db37eba88bb0156a7d1
SHA2560fd9d5dcfc3328107924a27f140289d7efcaf471a1b3cbca2ec90fb7b82af3f6
SHA512126ae960e3789a2e058a3cd3571d192a226ed30e14969d2253f314e6086c95372e8d7346aaf620d17187472aa3782fbd47a86bf87d7ae2f02d8efc350ac0ab0f
-
Filesize
1KB
MD55a573d0a7e893e4a39714cb9121c7133
SHA1eccaeb34277a655846274dd7e46f5a16cfa60ca9
SHA256f79facf802c7900db088a9fc7bd0261a7ac7b4e86ba531e18d438d73b97952f6
SHA51291b69787c9e910147efc22de8c969f39508bdbd498257e10cbbfafe708d3d2fc374002233f5bfc147c8545b227cb5c172738b5d862660e1a0bb83ed3dde0a28c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
79KB
MD56a82ec7dea40692810f389380b656632
SHA176f0430bb027be8267531bd4c74e5dff8c320209
SHA256071f192d91385241334a3d171871a3a5c48da7283edc155ea059af8a20c5e81d
SHA5127280b1c766657f8e050b7ba43c6a91b368b37868d31483eae455ae684a3d335a4dc82c7999e9c38d1b50730ece2b3e9b1b9e92c86b87b623dac8e07da27772c4