Analysis

  • max time kernel
    299s
  • max time network
    297s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 05:11

General

  • Target

    9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe

  • Size

    3.0MB

  • MD5

    b52de48e7dc1dd2aa4daf7f0301e1237

  • SHA1

    ce1c7493fd52e660e693faeb2bdb0f63c1b1d2b4

  • SHA256

    9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf

  • SHA512

    cf5c221609174e0cba0580cdfd2a76aab63850bb06b7a43119444b7896bd578044a1704b69b7935f2119827f0be0d9c0c0a1672eeddb3e27a0ee876d0805afec

  • SSDEEP

    12288:ZNfqWZCJ6qvvMOn8dnSOuscD5I+2XZGcYqj7lDGZhQ61cunbs:ZNf7MdznD5S4cYiFGZhX+qI

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

UxOlPOZZNwNV9srk

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/Dh8E7H3R

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe
        "C:\Users\Admin\AppData\Local\Temp\9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Counseling Counseling.cmd && Counseling.cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2520
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
              PID:2604
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2420
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
              4⤵
                PID:2684
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 55229645
                4⤵
                  PID:2708
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "CLOCKLICENSINGDESCRIBEDASUS" Cialis
                  4⤵
                    PID:2448
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Objectives + Registration 55229645\y
                    4⤵
                      PID:2456
                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\Partial.pif
                      55229645\Partial.pif 55229645\y
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2668
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 5 127.0.0.1
                      4⤵
                      • Runs ping.exe
                      PID:2428
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c schtasks.exe /create /tn "Habitat" /tr "wscript //B 'C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js'" /sc minute /mo 5 /F
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2488
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /create /tn "Habitat" /tr "wscript //B 'C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js'" /sc minute /mo 5 /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:2000
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url" & echo URL="C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url" & exit
                  2⤵
                  • Drops startup file
                  PID:2968
                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\RegAsm.exe
                  "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\RegAsm.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:2644
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {165146BE-1C60-47DC-B5B1-A8AA41D339D2} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2324
                • C:\Windows\system32\wscript.EXE
                  C:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js"
                  2⤵
                    PID:1676
                    • C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.pif
                      "C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.pif" "C:\Users\Admin\AppData\Local\VivaReality Studios\R"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2772

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\Partial.pif

                  Filesize

                  872KB

                  MD5

                  6ee7ddebff0a2b78c7ac30f6e00d1d11

                  SHA1

                  f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

                  SHA256

                  865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

                  SHA512

                  57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\y

                  Filesize

                  212KB

                  MD5

                  964350764b1d641eb6aed78942ca6348

                  SHA1

                  7f1c968200d5020bcd409b67a9e21f7ebb975a97

                  SHA256

                  a63bbd788f5c1d9b67b6259a1d68d708d52dadf726b770775402282f40135171

                  SHA512

                  e63f81f432e7dae1f5a37ce632a649455438975108b8e864d1c9f24fab3ced6eae2b64cfc3d89b9753728047ce2cde854ce0b14a7e6dbba1488ac53691c518f9

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cialis

                  Filesize

                  175B

                  MD5

                  d7c49067b84746e73f4da2824379abd2

                  SHA1

                  81f68c85f222cf4849a1b7bc6f8d00fa51a6bcf5

                  SHA256

                  bb22e99f061a62ff538b76e773edb380b079ce152e9e56dcb626e63402454ae2

                  SHA512

                  345ec51bf1aadfc89267ac749b8f4883fd27c326d532c08d45a43e8b98a3031586c67c1ef74cb73fd5a19b84845dc827db67198ca44cc126abca69c1a03020cb

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Clients

                  Filesize

                  1KB

                  MD5

                  1c26a79d50bf38afe267928e7ea5d76d

                  SHA1

                  ad2b0484de6775092b04d421c334796f4af43495

                  SHA256

                  4c4306dabdd45c30ab94e9306463af6e33b6bee9639b1ce5fbcd5122cab6e024

                  SHA512

                  43048e6299859c457f4f48643d3fb932387e3d446a2064a7cb97ebbd540c19c2aae726b7ed60f7a636080268dc90891c558d19b2c2316a4ef0d34d68449fcfb9

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Counseling

                  Filesize

                  11KB

                  MD5

                  68ab588b80948daa40f08f69bb7edf83

                  SHA1

                  2d04c116a0145c671001984e6f53f9b22c23a442

                  SHA256

                  59d3b8d8d4c8b1468d9e1ead0d424c5b811dc96160882a39511a54614afa827e

                  SHA512

                  5ea0728e76b2616c0533b755387b0c802a8cf53e01e5fde38c17ab783641d7ea6803c2b0b4c52aa1d4718e86cd429ca19252bc3c9600e8c5dcba3da540826c36

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Eight

                  Filesize

                  28KB

                  MD5

                  19e7d22057332a2fcf0ccecf092f9ee0

                  SHA1

                  123d3904ff805248a710f5ccfdb5174e49d8cf7a

                  SHA256

                  6b79e3a66ffa77230ccdd788db7b2e001091f58ff77ca6d172baf4020d9af7a6

                  SHA512

                  cc08c4b725adfcc7a2d7d574806d5c900030741bd04cc04eec18c52047523797d0bd3e87d23985a7f9078718b66e2f9f6861f25bdf106e9913c5c12ea1a8fd3c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Lauren

                  Filesize

                  227KB

                  MD5

                  76427158ee86155fb3825b7eea3d3505

                  SHA1

                  514486e2f2afaccf27e15f149951f7030cf60af0

                  SHA256

                  c8ee8a02e081da3a177afbefebe08346e7b8bf82c95742dd0c5a3dc56b7ad790

                  SHA512

                  592a096323cac70b433f2096837322e6e57ab79ec9ab7b799a18f4e6a19327708d17d503f9b5303c141347394937985788df5c267bbd59d3f31625cdafeebfaf

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Maria

                  Filesize

                  279KB

                  MD5

                  df4a08dc64af9dd0e620690bbd2cb7fd

                  SHA1

                  09e94e043562ac2842289d86495d6da5ba3a43fb

                  SHA256

                  6ad5ac214c1c5d5689199d5068dbcd67abcc1a4103ce69173d772e86d302d9b7

                  SHA512

                  042b411288969b4162ed1665bfe36155339090a9b9b45ca10c84521b66446c488fa942f23d28597831e6b337cefe8a40f2a5fb9d50bd62b7eee5bbc4de3a9daa

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mrs

                  Filesize

                  124KB

                  MD5

                  6600275ba8b5dfd012de0e3b65722620

                  SHA1

                  2b563207afe0319a87ca698f886357bc790456ab

                  SHA256

                  74fa376f8e97fd264e8dc874fb2b179a1c96f6fe20326e36a25136ff604e908b

                  SHA512

                  f16e8aee2f44970a29893cfe95a8684f05c583e226676bac4eecd724e0c6602ec18eb9c51ba481c77054c29c06772942b73b3c21290a4080e0c1d6973752ab31

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Objectives

                  Filesize

                  170KB

                  MD5

                  cecc88175e27a6b8387b029144d79dbb

                  SHA1

                  a1489a447fd68a062cc60151e39ce53d7f0301bc

                  SHA256

                  07100f5a1947860bfbb57e2a5d1e1d87f2b22c10be73dc2c2e5f7aac89a914f7

                  SHA512

                  fc8f92df83aecc7debc9153f4e5d551855a9de7334934b424dd4ecf59ab80bd709a588e52ba941ac3da26fe757d36a201ae2e6a9584d33758735f86a2c872e5e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Registration

                  Filesize

                  42KB

                  MD5

                  0fdbe417956628b2af001ed68ed8d143

                  SHA1

                  73a35219a4ed027d6dc8d4776422428256cb505c

                  SHA256

                  0e1673f1bcf015c103c4c3e61a27ef20b6076396c3a83a1e98310b0350747302

                  SHA512

                  61f713b30dea488c5cbc6755b6edf89f4bb46297a1523ec8b1788b3ab95ab65980d7ade8d4e99658d2d43459b793847a34f1016483c54c5bd9c69540b4c3b88e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Using

                  Filesize

                  213KB

                  MD5

                  8b6f7dc3cd0ac4cc213a41286fa81826

                  SHA1

                  4f3e0ddf9cd8f21f20c01dc7b666a361e4dce4fc

                  SHA256

                  5003b4f848ff6a59af66a82c80e9ce0d31c70a24b0a034f39e052703ce33348a

                  SHA512

                  9f5d1582ad48630f19d87df144c883195acab434d8185be12491ffad5402b4eb149b1e0bb64aa04688b55bc977ae3a46d447b6a2b6ffda4edd1fa63225f70a4b

                • C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js

                  Filesize

                  181B

                  MD5

                  26d6ab3699b22f116fff8262af7cc268

                  SHA1

                  1f590e2b2fd55cbf01e24e6a513d989d5333d5a0

                  SHA256

                  e394cb43b276521ba392a31e1840ea285d2f47122d5a11a8899a1bc45687d645

                  SHA512

                  0b8be554bc62efe08ecec6e5cd9a08ebaba61d05001d2ff7c9cb7a06680ff97c3d233cdddc913c4a7be1d6a75e4ea89586b11e294a908e977e8a919371bb41f3

                • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\RegAsm.exe

                  Filesize

                  63KB

                  MD5

                  b58b926c3574d28d5b7fdd2ca3ec30d5

                  SHA1

                  d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                  SHA256

                  6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                  SHA512

                  b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                • memory/2644-39-0x0000000000090000-0x00000000000A0000-memory.dmp

                  Filesize

                  64KB

                • memory/2644-42-0x0000000000090000-0x00000000000A0000-memory.dmp

                  Filesize

                  64KB

                • memory/2644-41-0x0000000000090000-0x00000000000A0000-memory.dmp

                  Filesize

                  64KB