Overview
overview
10Static
static
10LzFE9kDPVu...Z8.zip
windows7-x64
1LzFE9kDPVu...Z8.zip
windows10-2004-x64
1Ro-exec/De...gs.vbs
windows7-x64
3Ro-exec/De...gs.vbs
windows10-2004-x64
1Ro-exec/RE...c).txt
windows7-x64
1Ro-exec/RE...c).txt
windows10-2004-x64
1Ro-exec/dControl.ini
windows7-x64
1Ro-exec/dControl.ini
windows10-2004-x64
1Ro-exec/defcon.exe
windows7-x64
7Ro-exec/defcon.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
Ro-exec/ezdebug.png
windows7-x64
3Ro-exec/ezdebug.png
windows10-2004-x64
3Ro-exec/lo...pd.exe
windows7-x64
10Ro-exec/lo...pd.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 22:52
Behavioral task
behavioral1
Sample
LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Ro-exec/Defender_Settings.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ro-exec/Defender_Settings.vbs
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Ro-exec/READ ME (ro-exec).txt
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Ro-exec/READ ME (ro-exec).txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Ro-exec/dControl.ini
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Ro-exec/dControl.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Ro-exec/defcon.exe
Resource
win7-20240319-en
Behavioral task
behavioral10
Sample
Ro-exec/defcon.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
out.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Ro-exec/ezdebug.png
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Ro-exec/ezdebug.png
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Ro-exec/loader-upd.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Ro-exec/loader-upd.exe
Resource
win10v2004-20240412-en
General
-
Target
Ro-exec/loader-upd.exe
-
Size
70KB
-
MD5
573bd20fc8382d92a7ae9eae51e738e3
-
SHA1
55006093429df791f27e91a66e5ee63a81382b28
-
SHA256
09036ffa342f9e5bb1e31a867dcc3b60db011baba8c0d202aff1d33195cbe729
-
SHA512
d38736acff4128d6ce9ea17ee609ca33a37ac88f2c994cf4caf7f0eb62406a8963c33531b9f3cd020974d892c2751f3a4f67ce13ed6ba6080f97c406ccbb4aca
-
SSDEEP
1536:PmMfwrNATngx6fPLgD9vYebv2S5NiwWW6N9dOoihkAO:LCmn463UD6ebv242FzOoiSAO
Malware Config
Extracted
xworm
-
Install_directory
%Public%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/UWpQULMP
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral15/memory/1960-0-0x00000000000A0000-0x00000000000B8000-memory.dmp family_xworm behavioral15/files/0x000b00000001225e-100.dat family_xworm behavioral15/memory/2324-102-0x00000000002E0000-0x00000000002F8000-memory.dmp family_xworm behavioral15/memory/2156-106-0x0000000000360000-0x0000000000378000-memory.dmp family_xworm -
Executes dropped EXE 2 IoCs
pid Process 2324 svchost.exe 2156 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Public\\svchost.exe" loader-upd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 8 7.tcp.eu.ngrok.io 17 7.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1960 loader-upd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 powershell.exe 2628 powershell.exe 1716 powershell.exe 908 powershell.exe 1960 loader-upd.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1960 loader-upd.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 1960 loader-upd.exe Token: SeDebugPrivilege 2520 taskmgr.exe Token: SeDebugPrivilege 2324 svchost.exe Token: SeDebugPrivilege 2156 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1960 loader-upd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2608 1960 loader-upd.exe 28 PID 1960 wrote to memory of 2608 1960 loader-upd.exe 28 PID 1960 wrote to memory of 2608 1960 loader-upd.exe 28 PID 1960 wrote to memory of 2628 1960 loader-upd.exe 30 PID 1960 wrote to memory of 2628 1960 loader-upd.exe 30 PID 1960 wrote to memory of 2628 1960 loader-upd.exe 30 PID 1960 wrote to memory of 1716 1960 loader-upd.exe 32 PID 1960 wrote to memory of 1716 1960 loader-upd.exe 32 PID 1960 wrote to memory of 1716 1960 loader-upd.exe 32 PID 1960 wrote to memory of 908 1960 loader-upd.exe 34 PID 1960 wrote to memory of 908 1960 loader-upd.exe 34 PID 1960 wrote to memory of 908 1960 loader-upd.exe 34 PID 1960 wrote to memory of 1976 1960 loader-upd.exe 36 PID 1960 wrote to memory of 1976 1960 loader-upd.exe 36 PID 1960 wrote to memory of 1976 1960 loader-upd.exe 36 PID 2252 wrote to memory of 2324 2252 taskeng.exe 42 PID 2252 wrote to memory of 2324 2252 taskeng.exe 42 PID 2252 wrote to memory of 2324 2252 taskeng.exe 42 PID 2252 wrote to memory of 2156 2252 taskeng.exe 43 PID 2252 wrote to memory of 2156 2252 taskeng.exe 43 PID 2252 wrote to memory of 2156 2252 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ro-exec\loader-upd.exe"C:\Users\Admin\AppData\Local\Temp\Ro-exec\loader-upd.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Ro-exec\loader-upd.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'loader-upd.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\svchost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost.exe"2⤵
- Creates scheduled task(s)
PID:1976
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2520
-
C:\Windows\system32\taskeng.exetaskeng.exe {81139A6A-EE82-4FF2-B001-0535123B1290} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Public\svchost.exeC:\Users\Public\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Users\Public\svchost.exeC:\Users\Public\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53db8b33c5920432abc472eaa5d3026d4
SHA1472d5668c51b6be023b838356657344072babac5
SHA2565b7eafbfc0cf51e4ab67994dfd286194f44ddeb438653bbc036d8a8f2622bb04
SHA512bd73f18d87ead495e2835615ebbf61e385744fdd4c721e243d496d7701455d87ffb4c9997ce7941067e98ffdf085afa545e404abd21d2ab3e90432a08fcb591d
-
Filesize
70KB
MD5573bd20fc8382d92a7ae9eae51e738e3
SHA155006093429df791f27e91a66e5ee63a81382b28
SHA25609036ffa342f9e5bb1e31a867dcc3b60db011baba8c0d202aff1d33195cbe729
SHA512d38736acff4128d6ce9ea17ee609ca33a37ac88f2c994cf4caf7f0eb62406a8963c33531b9f3cd020974d892c2751f3a4f67ce13ed6ba6080f97c406ccbb4aca