Overview
overview
10Static
static
10Krampus/B1...BH.exe
windows7-x64
10Krampus/B1...BH.exe
windows10-2004-x64
10Krampus/ON...EN.exe
windows7-x64
7Krampus/ON...EN.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Bloxtrap.exe
windows7-x64
1Bloxtrap.exe
windows10-2004-x64
LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 09:13
Behavioral task
behavioral1
Sample
Krampus/B1OdUv8CBH.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Krampus/B1OdUv8CBH.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Krampus/ONLY RUN THIS IF IT DOESNT OPEN.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Krampus/ONLY RUN THIS IF IT DOESNT OPEN.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Bloxtrap.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Bloxtrap.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral14
Sample
ffmpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win7-20240215-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral18
Sample
libGLESv2.dll
Resource
win7-20240220-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20240419-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral22
Sample
vk_swiftshader.dll
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
vk_swiftshader.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
vulkan-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240419-en
General
-
Target
Krampus/B1OdUv8CBH.exe
-
Size
1.0MB
-
MD5
73a20ee98214059033a93ff5da62d903
-
SHA1
a35422a4969f7d79fc9cf597cf40b7456d5b05d8
-
SHA256
5df7cf7c7d153a0e55b0ca9299d00c26625e70cff3613540c5718fe74e4c7d12
-
SHA512
7c3b08ebbc57467aa3615b14d7ea6f629e03e49c17d6268f62345cc58f4ca9823e45ef101c1e247db354ca944481470f94f9c226bc7774f78da9ad0185a76b47
-
SSDEEP
1536:ZAiYlXZeFi9eKNVlb8i7ZUNQmD4O+HoddUT:anpo2Xb8C8D4OUoET
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/z5PQ82wE
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2704-0-0x0000000000D20000-0x0000000000D3A000-memory.dmp family_xworm behavioral1/memory/2704-2-0x000000001B3A0000-0x000000001B420000-memory.dmp family_xworm behavioral1/files/0x000c000000014ec4-10.dat family_xworm behavioral1/memory/2768-12-0x00000000002C0000-0x00000000002DA000-memory.dmp family_xworm behavioral1/memory/1796-15-0x0000000000990000-0x00000000009AA000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk B1OdUv8CBH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk B1OdUv8CBH.exe -
Executes dropped EXE 2 IoCs
pid Process 2768 svchost.exe 1796 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" B1OdUv8CBH.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2704 B1OdUv8CBH.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 B1OdUv8CBH.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2704 B1OdUv8CBH.exe Token: SeDebugPrivilege 2704 B1OdUv8CBH.exe Token: SeDebugPrivilege 2768 svchost.exe Token: SeDebugPrivilege 1796 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 B1OdUv8CBH.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2876 2704 B1OdUv8CBH.exe 29 PID 2704 wrote to memory of 2876 2704 B1OdUv8CBH.exe 29 PID 2704 wrote to memory of 2876 2704 B1OdUv8CBH.exe 29 PID 2424 wrote to memory of 2768 2424 taskeng.exe 34 PID 2424 wrote to memory of 2768 2424 taskeng.exe 34 PID 2424 wrote to memory of 2768 2424 taskeng.exe 34 PID 2424 wrote to memory of 1796 2424 taskeng.exe 37 PID 2424 wrote to memory of 1796 2424 taskeng.exe 37 PID 2424 wrote to memory of 1796 2424 taskeng.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krampus\B1OdUv8CBH.exe"C:\Users\Admin\AppData\Local\Temp\Krampus\B1OdUv8CBH.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"2⤵
- Creates scheduled task(s)
PID:2876
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {30C767CD-2513-446E-8419-F2B162E4C918} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD573a20ee98214059033a93ff5da62d903
SHA1a35422a4969f7d79fc9cf597cf40b7456d5b05d8
SHA2565df7cf7c7d153a0e55b0ca9299d00c26625e70cff3613540c5718fe74e4c7d12
SHA5127c3b08ebbc57467aa3615b14d7ea6f629e03e49c17d6268f62345cc58f4ca9823e45ef101c1e247db354ca944481470f94f9c226bc7774f78da9ad0185a76b47