Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:51
Behavioral task
behavioral1
Sample
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe
Resource
win10v2004-20240226-en
General
-
Target
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe
-
Size
2.1MB
-
MD5
3b5757f632446842aac3ecd3f1c28366
-
SHA1
4e00b5c8670c8a184632bdd48eedb3f90fdd4f19
-
SHA256
32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2
-
SHA512
bee2b4ea1025ba5fd47ace7b3d9d72527ec6511aeb113f1d709c3df0debcb09405e20c5d746719d2bd91b7f304469c2c7dc9f8b746bec953947bbb9583601c6d
-
SSDEEP
49152:UqwmCCmvuorNkZQfE8UoGH3pRKl9+VvHu7fAws5Q:b8u8kainHPxVvHW3s5Q
Malware Config
Extracted
xworm
5.0
5.182.87.154:7000
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3104-0-0x0000000000B80000-0x0000000000DA0000-memory.dmp family_xworm behavioral1/memory/628-280-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/3104-0-0x0000000000B80000-0x0000000000DA0000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msmgnr.lnk MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3104 set thread context of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 1440 powershell.exe 1440 powershell.exe 1440 powershell.exe 3484 powershell.exe 3484 powershell.exe 3484 powershell.exe 2896 powershell.exe 2896 powershell.exe 2896 powershell.exe 628 MSBuild.exe 628 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe Token: SeDebugPrivilege 628 MSBuild.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 628 MSBuild.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 3104 wrote to memory of 628 3104 32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe 100 PID 628 wrote to memory of 2372 628 MSBuild.exe 102 PID 628 wrote to memory of 2372 628 MSBuild.exe 102 PID 628 wrote to memory of 2372 628 MSBuild.exe 102 PID 628 wrote to memory of 1440 628 MSBuild.exe 105 PID 628 wrote to memory of 1440 628 MSBuild.exe 105 PID 628 wrote to memory of 1440 628 MSBuild.exe 105 PID 628 wrote to memory of 3484 628 MSBuild.exe 109 PID 628 wrote to memory of 3484 628 MSBuild.exe 109 PID 628 wrote to memory of 3484 628 MSBuild.exe 109 PID 628 wrote to memory of 2896 628 MSBuild.exe 111 PID 628 wrote to memory of 2896 628 MSBuild.exe 111 PID 628 wrote to memory of 2896 628 MSBuild.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe"C:\Users\Admin\AppData\Local\Temp\32ba94d58bb386a630c0f7ff76b730caa6e18dc023262bc160a4bc695d4d6ac2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exesad2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msmgnr.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4808
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD53c3a1cb309651967080ffb257fcef9c5
SHA17f51a6b573a2a09091bc615613ac5e30cb0dcd60
SHA256ea53c1302109e01957115f2efc7f5e0377c557023ec53d0d944980c5a6e7dd8a
SHA51209f2c5d3aa816f078ca9450c93d937756a8c5733d3b82afe576fa792f85d3bf3bf6f1c9b38dbbd633cb389ca52c7ce35904d61a5afbe48eda454ca4d2fc5081c
-
Filesize
18KB
MD50785582d1dc3f384ef7d06cf7ad970fc
SHA12c1b984c5003c96de9b94d04735811a5fa3265a9
SHA2567ccf5651964e18d79c44057bb8fff3036bbd2e05666bec8737e2551832c0816d
SHA5122074ff3182c51448d0a28221333e6ed07016352cb7c27f142791b08747c21f6d167546e81599d0ba0fd372c0688237fd834225b67a8e8a0708a0dbeea5fbdb41
-
Filesize
18KB
MD590a9543e17e2e32b9a7b4926d9314198
SHA18bfb20d2bcf73f246b85524fb7450cd6fb7933a4
SHA2569c5b55f634f92fbe322c9d1fe8ce0e856c4c7507009fa6aa462cf876db9f7ac0
SHA5128705d36bead58725cba9a137b38b3ce3fd7d2ab380d6d17548c609810ec69e7d0c444d421f9bc647e6d5aff1f17916a9b30899ed8f7ce7a09f7c945001ff93bb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82