Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe
Resource
win11-20240412-en
General
-
Target
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe
-
Size
50KB
-
MD5
fe7c4b36fca4fdf53789979a4a09c880
-
SHA1
89caf7f3b9f4d7d732ade5593e1958f6f025afa1
-
SHA256
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470
-
SHA512
e0668f6dfda991ab07870d53ce291f73d48533c44dfed1178c8b98b57c799eb77f19451bc70d09caaf757bf18ef6217b44e7fc626b38c89261dc8920796339f3
-
SSDEEP
768:mDrJUAkwf3ppZuBdrm+KiPxWEh9HgPxWEjj4G:8rkwf3ppZRsPxZgPx94G
Malware Config
Extracted
xworm
3.1
gamemodz.duckdns.org:6969
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kgmqth.exe family_hermeticwiper -
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-4896-0x0000000000400000-0x0000000000418000-memory.dmp family_xworm -
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4296-3-0x0000000006210000-0x0000000006436000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-6-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-7-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-9-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-13-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-11-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-15-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-17-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-19-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-21-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-23-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-25-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-27-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-29-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-31-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-33-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-35-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-37-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-39-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-41-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-43-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-45-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-47-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-49-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-51-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-53-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-55-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-57-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-59-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-61-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-63-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-65-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-67-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 behavioral1/memory/4296-69-0x0000000006210000-0x0000000006430000-memory.dmp family_zgrat_v1 -
HermeticWiper
HermeticWiper is a partition-corrupting malware used in cyberattacks against Ukrainian organizations.
-
Drops file in Drivers directory 3 IoCs
Processes:
kgmqth.exedescription ioc process File created C:\Windows\system32\Drivers\pvdr.sys kgmqth.exe File created C:\Windows\system32\Drivers\pvdr kgmqth.exe File opened for modification C:\Windows\system32\Drivers\pvdr kgmqth.exe -
Drops startup file 2 IoCs
Processes:
cvtres.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvtres.lnk cvtres.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvtres.lnk cvtres.exe -
Executes dropped EXE 1 IoCs
Processes:
kgmqth.exepid process 4816 kgmqth.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cvtres.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cvtres = "C:\\Users\\Admin\\AppData\\Roaming\\cvtres.exe" cvtres.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 36 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exedescription pid process target process PID 4296 set thread context of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 660 660 660 660 660 -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.execvtres.exekgmqth.exedescription pid process Token: SeDebugPrivilege 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe Token: SeDebugPrivilege 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe Token: SeDebugPrivilege 2820 cvtres.exe Token: SeDebugPrivilege 2820 cvtres.exe Token: 0 4816 kgmqth.exe Token: SeBackupPrivilege 4816 kgmqth.exe Token: SeLoadDriverPrivilege 4816 kgmqth.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.execvtres.exedescription pid process target process PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 4296 wrote to memory of 2820 4296 1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe cvtres.exe PID 2820 wrote to memory of 688 2820 cvtres.exe schtasks.exe PID 2820 wrote to memory of 688 2820 cvtres.exe schtasks.exe PID 2820 wrote to memory of 688 2820 cvtres.exe schtasks.exe PID 2820 wrote to memory of 4816 2820 cvtres.exe kgmqth.exe PID 2820 wrote to memory of 4816 2820 cvtres.exe kgmqth.exe PID 2820 wrote to memory of 4816 2820 cvtres.exe kgmqth.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe"C:\Users\Admin\AppData\Local\Temp\1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cvtres" /tr "C:\Users\Admin\AppData\Roaming\cvtres.exe"3⤵
- Creates scheduled task(s)
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\kgmqth.exe"C:\Users\Admin\AppData\Local\Temp\kgmqth.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD53f4a16b29f2f0532b7ce3e7656799125
SHA161b25d11392172e587d8da3045812a66c3385451
SHA2561bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
SHA51232acaceda42128ef9e0a9f36ee2678d2fc296fda2df38629eb223939c8a9352b3bb2b7021bb84e9f223a4a26df57b528a711447b1451213a013fe00f9b971d80
-
Filesize
45KB
MD570d838a7dc5b359c3f938a71fad77db0
SHA166b83eb16481c334719eed406bc58a3c2b910923
SHA256e4dbdbf7888ea96f3f8aa5c4c7f2bcf6e57d724dd8194fe5f35b673c6ef724ea
SHA5129c9a945db5b5e7ff8105bfe74578e6f00b5f707f7c3d8f1f1fb41553a6d0eab29cef026e77877a1ad6435fa7bc369141921442e1485f2b0894c6bbcbd7791034