Analysis

  • max time kernel
    108s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 07:31

General

  • Target

    f267a71692c3683e3d6d0461e003f54f.exe

  • Size

    2.3MB

  • MD5

    f267a71692c3683e3d6d0461e003f54f

  • SHA1

    189450a513d1f2412470eb965468f1324633d252

  • SHA256

    74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251

  • SHA512

    b376166646548104ee092beba9af8af5a04695f828e1a1b21ccdfd8a1cb88347a40f31108066d0fe6176a5ce18bf3ef3b8ce4e82a6c6a6ee886efe2bfa7a7bd7

  • SSDEEP

    49152:qjOIzFMNQnXmsIi7MS4bdotKHDG/GGcYsKYX78Y5Ye3:qjvzFMNQnWspj4bdot45GdsKYXl5Yo

Malware Config

Extracted

Family

xworm

Version

3.1

C2

gamemodz.duckdns.org:6969

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect HermeticWiper 1 IoCs

    Detect HermeticWiper Payload.

  • Detect Xworm Payload 2 IoCs
  • Detect ZGRat V1 34 IoCs
  • HermeticWiper

    HermeticWiper is a partition-corrupting malware used in cyberattacks against Ukrainian organizations.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops file in Drivers directory 42 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f267a71692c3683e3d6d0461e003f54f.exe
    "C:\Users\Admin\AppData\Local\Temp\f267a71692c3683e3d6d0461e003f54f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\$77d8217c
      "C:\Users\Admin\AppData\Local\Temp\$77d8217c"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 128
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2500
    • C:\Users\Admin\AppData\Local\Temp\$775574fe
      "C:\Users\Admin\AppData\Local\Temp\$775574fe"
      2⤵
      • Drops file in Drivers directory
      • Manipulates Digital Signatures
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$775574fe" /tr "C:\Users\Admin\AppData\Roaming\$775574fe"
        3⤵
        • Creates scheduled task(s)
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\nwoakg.exe
        "C:\Users\Admin\AppData\Local\Temp\nwoakg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\system32\wscript.exe
          "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\93F6.tmp\93F7.tmp\93F8.vbs //Nologo
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\mbr.exe
            "C:\Users\Admin\AppData\Local\Temp\93F6.tmp\mbr.exe"
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:1300
          • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\bytebeat1.exe
            "C:\Users\Admin\AppData\Local\Temp\93F6.tmp\bytebeat1.exe"
            5⤵
            • Executes dropped EXE
            PID:760
          • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\rgb.exe
            "C:\Users\Admin\AppData\Local\Temp\93F6.tmp\rgb.exe"
            5⤵
            • Executes dropped EXE
            PID:2956
          • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\sinewaves.exe
            "C:\Users\Admin\AppData\Local\Temp\93F6.tmp\sinewaves.exe"
            5⤵
              PID:2136
            • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\Lines.exe
              "C:\Users\Admin\AppData\Local\Temp\93F6.tmp\Lines.exe"
              5⤵
                PID:2620
          • C:\Users\Admin\AppData\Local\Temp\xihbdo.exe
            "C:\Users\Admin\AppData\Local\Temp\xihbdo.exe"
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:108
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {28BAE6C8-7A71-4E26-9264-633DD00E9058} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Users\Admin\AppData\Roaming\$775574fe
          C:\Users\Admin\AppData\Roaming\$775574fe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Users\Admin\AppData\Local\Temp\$77a3d85e
            "C:\Users\Admin\AppData\Local\Temp\$77a3d85e"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2400

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab

        Filesize

        9B

        MD5

        9d88efac0177f99fa528033afb54e378

        SHA1

        a6fef6b2f49cdb2e476020bd1e7da65997d9bfc3

        SHA256

        845640b68b92599fcab7a1a64ddd79087781cefcc5ed743ac4eee5c760b4ada5

        SHA512

        ffa3236f35b7e8ed5e52c31d330aaf1bb0ee87e5e107b033a3377f593d6a02c6716332f582c175fc2f17a520db9f28036254c58b2fea74844e1e90f75628abfc

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\93F7.tmp\93F8.vbs

        Filesize

        3KB

        MD5

        dbe460e73bc825119c6326250ac8f223

        SHA1

        191f599142390b486868a952f6c3df8eedc60ab2

        SHA256

        39ec4ede07d340f3ce319a28da8ebf3cdee86ae95241a53fa99fe729746aaef0

        SHA512

        f363475209e743e38b32078a24f99e89c93e18e7100a4c28d49d9054e981cbcaaef6960d434464af6f37789f76065d18671609e3a1b369ced34a8b14da1b06a3

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\Lines.exe

        Filesize

        103KB

        MD5

        6381e3e4b02204e1353218ee6ec45c2a

        SHA1

        a350d4432d2a1a8c7a34d5ea7214326ffc02c270

        SHA256

        df3cc9a807a80697cd8b72f8f17a365849146cb4e41b4340e42f78d1bc1722e1

        SHA512

        ac7f21c539667a77236b78006740c634b7d4c0a55dcb776872bb339501112c62e1990bbb73b8f3c4e5b065167b8102fe35aa4633248b19dca602606b68b15015

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\bytebeat1.exe

        Filesize

        102KB

        MD5

        6b673ece600bcc8a665ebf251d7d926e

        SHA1

        64ef7c73a713bf3c55fb4ac4e5366a7a425f1b4e

        SHA256

        41ac58d922f32134e75e87898d2c179d478c81edaae0d9bc28e7ce7d6f422f8b

        SHA512

        feb18a1aa72de47fd67919e196abd200afdf22ad5a7e5dac20593252d8b2ca86982bb07c2fed3681ef06c9933c6d197590c1df65aa5df93cb6abafca5e53e9ff

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\bytebeat1.wav

        Filesize

        1.3MB

        MD5

        09d2094f56d2d38aa64eac1d90c5a554

        SHA1

        c6268759b1eee9fdfafa0d605d62bbbf85defbca

        SHA256

        4599f6f06c7f491a50e3c4012a83cce9f3ee13ae209189cb8964f0b6ba14614c

        SHA512

        4ca756a06612c281ec03dd9f064b9ddaf6756b00a5d54dee62728f5cdd7ad3d928559b9857ed2f733b8b3e842b396fed94b212ef2a384265ac623433d67010f3

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\mbr.exe

        Filesize

        577KB

        MD5

        d1174d4066bc2b4c09059e7839651eac

        SHA1

        a2b326436cb9a61ab1a9c1daa0aa6e6d424dc878

        SHA256

        5000f70ff57cf2662d4b49c1c4ad275ac3f3d241f620988978e552c6f1c2d4fb

        SHA512

        7ddef5b623aaa5de346cafb51a88b527d98190f7dea747b8809cfe7e7fd869dd2a202385169896c84d77db76df3d68ecfdb7d7cbdec556d071028306fe7375bd

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\rgb.exe

        Filesize

        105KB

        MD5

        bfc9e8ab494313d6efb67fc8942f5ee9

        SHA1

        1b42cc97803221538e020cb90517cb808cf19381

        SHA256

        33cbdb6e00f3f42f58502af8a9150604a44bb9b26825c909aa0edb5c744a1f13

        SHA512

        2d01f92397b65eade1f6140f80e2cb626b3e53b112c7e77e84ea7f6092b07c05eacb9e5e9bcb4676c8bdd10fcfba4fe297f2a01eedffffa594af87839baae030

      • C:\Users\Admin\AppData\Local\Temp\93F6.tmp\sinewaves.exe

        Filesize

        108KB

        MD5

        e9534d452e7b06b5591e0509553f8d86

        SHA1

        2be1075e3ffe29c95fb0fcbed4dcf9fc54788a58

        SHA256

        edce21b4ec9b68e4e8a5232c1432d5de0865f1fded27fc69965a2d3d568de909

        SHA512

        21c40c98f9351676f9a105a733472b4b9145a2a2fe13a82b681fec1c73d893bd2be472938e2b84b70836875ed18d0e615a003b4af0f99d5d463f2031500b57c3

      • C:\Users\Admin\AppData\Local\Temp\nwoakg.exe

        Filesize

        791KB

        MD5

        e9d46548e6009b9dd5648fce65b22511

        SHA1

        7f1aae821773d8481df3453d6ad2c6074cb55fb6

        SHA256

        e320066f7580bb1d65f073fc673e14b5fe07021474e9254e8a78b3bb4f28e0be

        SHA512

        bf15cee63ae05521407fc6d578daa44fd5d6f7dd876beeae01fc00906d2e949855121f81cde0042bf76a2f9bb35730606b47c5123cbf3d6ffc4a0abaf5543f44

      • C:\Users\Admin\AppData\Local\Temp\xihbdo.exe

        Filesize

        114KB

        MD5

        3f4a16b29f2f0532b7ce3e7656799125

        SHA1

        61b25d11392172e587d8da3045812a66c3385451

        SHA256

        1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591

        SHA512

        32acaceda42128ef9e0a9f36ee2678d2fc296fda2df38629eb223939c8a9352b3bb2b7021bb84e9f223a4a26df57b528a711447b1451213a013fe00f9b971d80

      • \Users\Admin\AppData\Local\Temp\$77d8217c

        Filesize

        2.3MB

        MD5

        f267a71692c3683e3d6d0461e003f54f

        SHA1

        189450a513d1f2412470eb965468f1324633d252

        SHA256

        74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251

        SHA512

        b376166646548104ee092beba9af8af5a04695f828e1a1b21ccdfd8a1cb88347a40f31108066d0fe6176a5ce18bf3ef3b8ce4e82a6c6a6ee886efe2bfa7a7bd7

      • memory/2028-4885-0x0000000000E40000-0x0000000000EC8000-memory.dmp

        Filesize

        544KB

      • memory/2028-4883-0x0000000004A90000-0x0000000004AD0000-memory.dmp

        Filesize

        256KB

      • memory/2028-22-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-24-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-26-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-28-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-30-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-32-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-34-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-36-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-38-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-40-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-42-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-44-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-46-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-48-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-50-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-52-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-54-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-56-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-60-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-58-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-62-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-64-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-66-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-12-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-4884-0x0000000000520000-0x0000000000521000-memory.dmp

        Filesize

        4KB

      • memory/2028-1-0x00000000745E0000-0x0000000074CCE000-memory.dmp

        Filesize

        6.9MB

      • memory/2028-4886-0x00000000049E0000-0x0000000004A2C000-memory.dmp

        Filesize

        304KB

      • memory/2028-18-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-4911-0x0000000004A30000-0x0000000004A84000-memory.dmp

        Filesize

        336KB

      • memory/2028-4927-0x00000000745E0000-0x0000000074CCE000-memory.dmp

        Filesize

        6.9MB

      • memory/2028-0-0x0000000001310000-0x000000000156E000-memory.dmp

        Filesize

        2.4MB

      • memory/2028-2-0x0000000005D50000-0x0000000005F9C000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-20-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-10-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-3-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-4-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-14-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-6-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-16-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2028-8-0x0000000005D50000-0x0000000005F96000-memory.dmp

        Filesize

        2.3MB

      • memory/2224-12875-0x0000000004D80000-0x0000000004DC0000-memory.dmp

        Filesize

        256KB

      • memory/2224-13424-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2224-12878-0x0000000000720000-0x0000000000721000-memory.dmp

        Filesize

        4KB

      • memory/2224-8148-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2224-4944-0x00000000001B0000-0x000000000040E000-memory.dmp

        Filesize

        2.4MB

      • memory/2224-4943-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2400-13435-0x0000000000080000-0x0000000000098000-memory.dmp

        Filesize

        96KB

      • memory/2400-13436-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2400-18687-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2868-23329-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/2868-26146-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/3004-7105-0x0000000002250000-0x000000000225A000-memory.dmp

        Filesize

        40KB

      • memory/3004-9610-0x0000000004B30000-0x0000000004B60000-memory.dmp

        Filesize

        192KB

      • memory/3004-23324-0x0000000008060000-0x0000000008138000-memory.dmp

        Filesize

        864KB

      • memory/3004-5903-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/3004-25868-0x0000000000850000-0x0000000000890000-memory.dmp

        Filesize

        256KB

      • memory/3004-15483-0x0000000000850000-0x0000000000890000-memory.dmp

        Filesize

        256KB

      • memory/3004-26145-0x0000000008060000-0x0000000008138000-memory.dmp

        Filesize

        864KB

      • memory/3004-4932-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3004-26153-0x0000000000850000-0x0000000000890000-memory.dmp

        Filesize

        256KB

      • memory/3004-4933-0x0000000074560000-0x0000000074C4E000-memory.dmp

        Filesize

        6.9MB

      • memory/3004-26275-0x0000000000850000-0x0000000000890000-memory.dmp

        Filesize

        256KB

      • memory/3004-26277-0x0000000000830000-0x000000000083C000-memory.dmp

        Filesize

        48KB