Analysis
-
max time kernel
599s -
max time network
598s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 00:45
Behavioral task
behavioral1
Sample
23vcD1orbL.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23vcD1orbL.exe
Resource
win10v2004-20240226-en
General
-
Target
23vcD1orbL.exe
-
Size
1.3MB
-
MD5
d48c30f50906d73b06aabec4a3c0ef96
-
SHA1
4ed2965e2c48d3e35a3e4e1ea8781d3761de94a5
-
SHA256
71015901a4bbe9f7f81a3f899bf7c21ceca2a332e272e31a4d6d2b6b4f71a59f
-
SHA512
71eb7ca54f7f1019716c9e5a323d0ffa892a6485fe387044deb9fe431e809bd2f8be5e35f3aba185eb53d437fc63a5a66704815b612e6ea960220610d459265f
-
SSDEEP
1536:c/G4iM3eweCmtR8K/ddBNm/LBOK+kAYxQb1biW3+FQxEfOO701d67/fxU9:cOrZ8kyt3AYeb1WRSEfO1vd9
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/z5PQ82wE
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2080-0-0x0000000000150000-0x000000000016C000-memory.dmp family_xworm behavioral2/files/0x000a0000000231e2-7.dat family_xworm -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 23vcD1orbL.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk 23vcD1orbL.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk 23vcD1orbL.exe -
Executes dropped EXE 10 IoCs
pid Process 2704 svchost.exe 5100 svchost.exe 1604 svchost.exe 2552 svchost.exe 5020 svchost.exe 2616 svchost.exe 3316 svchost.exe 4316 svchost.exe 3716 svchost.exe 4740 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" 23vcD1orbL.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 83 0.tcp.eu.ngrok.io 137 0.tcp.eu.ngrok.io 15 pastebin.com 25 0.tcp.eu.ngrok.io 108 0.tcp.eu.ngrok.io 127 0.tcp.eu.ngrok.io 57 0.tcp.eu.ngrok.io 101 0.tcp.eu.ngrok.io 117 0.tcp.eu.ngrok.io 16 pastebin.com 54 0.tcp.eu.ngrok.io 74 0.tcp.eu.ngrok.io 92 0.tcp.eu.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1052 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2080 23vcD1orbL.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2080 23vcD1orbL.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2080 23vcD1orbL.exe Token: SeDebugPrivilege 2080 23vcD1orbL.exe Token: SeDebugPrivilege 2704 svchost.exe Token: SeDebugPrivilege 5100 svchost.exe Token: SeDebugPrivilege 1604 svchost.exe Token: SeDebugPrivilege 2552 svchost.exe Token: SeDebugPrivilege 5020 svchost.exe Token: SeDebugPrivilege 2616 svchost.exe Token: SeDebugPrivilege 3316 svchost.exe Token: SeDebugPrivilege 4316 svchost.exe Token: SeDebugPrivilege 3716 svchost.exe Token: SeDebugPrivilege 4740 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 23vcD1orbL.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1052 2080 23vcD1orbL.exe 93 PID 2080 wrote to memory of 1052 2080 23vcD1orbL.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\23vcD1orbL.exe"C:\Users\Admin\AppData\Local\Temp\23vcD1orbL.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"2⤵
- Creates scheduled task(s)
PID:1052
-
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d48c30f50906d73b06aabec4a3c0ef96
SHA14ed2965e2c48d3e35a3e4e1ea8781d3761de94a5
SHA25671015901a4bbe9f7f81a3f899bf7c21ceca2a332e272e31a4d6d2b6b4f71a59f
SHA51271eb7ca54f7f1019716c9e5a323d0ffa892a6485fe387044deb9fe431e809bd2f8be5e35f3aba185eb53d437fc63a5a66704815b612e6ea960220610d459265f
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1