Resubmissions

23-03-2024 17:10

240323-vp3klahg49 10

Analysis

  • max time kernel
    232s
  • max time network
    239s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 17:10

General

  • Target

    Xclinet.exe

  • Size

    140KB

  • MD5

    066f7723bbfa71ece05354f0ccb426dc

  • SHA1

    45f9e00fd1cf2be0e5825e951c582e7c117f451c

  • SHA256

    b1f040dfbc18222c390a807de1bea52974808ef37dea145fe34e3a75dff99b7f

  • SHA512

    eb92d1c550a073a28cbc961be4d280893bc50ed7243e5adb5ca08fe7c2748b9719cc39f21bd96de7f13ecf7a28520f631b0226a8d953412a7b4be589329fefd1

  • SSDEEP

    1536:kh4ylNPpv6jlSsI0h4npvb9iSL6n0mTOXfpAf+YXLK5RJX1:kh4yQJendb9jLmOef+YXQ7

Malware Config

Extracted

Family

xworm

C2

throughout-taxation.gl.at.ply.gg:48020

Attributes
  • Install_directory

    %AppData%

  • install_file

    xworm connected?.exe

Extracted

Path

C:\Users\Admin\Desktop\READ ME FOR AN EXPLAINETION.txt

Ransom Note
All of your files have been encrypted. Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help. What can I do to get my files back? You can buy our special decryption software. This software will allow you to recover all of your data and remove the ransomware from your computer. The price for the software is $50. Payment can be made in Bitcoin (Bitcoin Address: bc1qakhl8eu20ely220fxm6d3tjsk2al64vrha4sxa), Ethereum (ETH Address: 0x22D2C1C38b3c26C9E403B34ea5aF42Af00e90d9f), Binance Coin (BNB Address: bnb17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHV0205gfc6ykk), or through PayPal (Burner Account: [email protected]). You can make the payment directly by visiting this PayPal site: PayPal Payment Site. How do I pay, where do I get Bitcoin, Ethereum, Binance Coin, or PayPal? Purchasing Bitcoin, Ethereum, or Binance Coin varies from country to country, you are best advised to do a quick Google search yourself to find out how to buy Bitcoin, Ethereum, Binance Coin, or set up a PayPal account. These sites will help you to get fast and reliable Bitcoin, Ethereum, Binance Coin, or PayPal. Coinmama - https://www.coinmama.com Bitpanda - https://www.bitpanda.com If you will try to seek for help or advice we recommend not to. Why you ask? Because no other software can decrypt this ransomware, only us have the special key to unlock it. So getting other decrypters will be worthless. Don't even think about calling the cops; we will snitch about your pedo activity! You have exactly 12 hours from now to pay up or your PC will be locked for a very long time, approximately 125 Years! Have fun buddy. We monitor every move you make, 👁️‍🗨️ with 8 eyes on you, always one step ahead 👁️, lurking in your devices.
URLs

https://www.coinmama.com

https://www.bitpanda.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 34 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xclinet.exe
    "C:\Users\Admin\AppData\Local\Temp\Xclinet.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "xworm connected?" /tr "C:\Users\Admin\AppData\Roaming\xworm connected?.exe"
      2⤵
      • Creates scheduled task(s)
      PID:1840
    • C:\Users\Admin\AppData\Local\Temp\swewni.exe
      "C:\Users\Admin\AppData\Local\Temp\swewni.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ ME FOR AN EXPLAINETION.txt
          4⤵
            PID:648
      • C:\Windows\SYSTEM32\CMD.EXE
        "CMD.EXE"
        2⤵
          PID:1592
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x410 0x31c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\swewni.exe

        Filesize

        90KB

        MD5

        68a7df17272b831cfc66c1032c32facf

        SHA1

        dea12fb894f88ed6c905ca56b424252909d91c24

        SHA256

        4f08c19447c00c39129518e6694bd1780174912b39327f5468e8523a2e423e5d

        SHA512

        d555da23a9b1fa25988afb6c530de2d15f6a3494603e43d220a35f1c605c2537287daf5a6876360fdec83e41ab5d876f6dbac06c25e896ac5902fc9b85f3ea25

      • C:\Users\Admin\Desktop\READ ME FOR AN EXPLAINETION.txt

        Filesize

        1KB

        MD5

        43779c2e45e690a7725dec568068513e

        SHA1

        9e89a34b8d270788c4b690348563d83ac17436ea

        SHA256

        4593281a0ce90b519b799ac1d04af6643a0ba37b7cef27aad16ee9dead959545

        SHA512

        60aed98583262f3f44b845b73bdf13b5db19e8020a4dc28aa2196ff9762e2320c9260c0034768e29136a92200b1f8b6739e76fcdb905dfca03ea0a52ee326d58

      • memory/1992-18-0x0000000000210000-0x000000000022C000-memory.dmp

        Filesize

        112KB

      • memory/1992-19-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/1992-32-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/4800-86-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/4800-33-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/4968-6-0x000000001CA30000-0x000000001CABE000-memory.dmp

        Filesize

        568KB

      • memory/4968-0-0x00000000001A0000-0x00000000001C8000-memory.dmp

        Filesize

        160KB

      • memory/4968-2-0x000000001AE50000-0x000000001AE60000-memory.dmp

        Filesize

        64KB

      • memory/4968-3-0x000000001AE30000-0x000000001AE3C000-memory.dmp

        Filesize

        48KB

      • memory/4968-5-0x000000001AE50000-0x000000001AE60000-memory.dmp

        Filesize

        64KB

      • memory/4968-1-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/4968-85-0x000000001E300000-0x000000001E30A000-memory.dmp

        Filesize

        40KB

      • memory/4968-4-0x00007FFFEDF60000-0x00007FFFEEA21000-memory.dmp

        Filesize

        10.8MB

      • memory/4968-87-0x000000001B9E0000-0x000000001B9EA000-memory.dmp

        Filesize

        40KB