Analysis
-
max time kernel
299s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe
Resource
win7-20240221-en
General
-
Target
9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe
-
Size
3.0MB
-
MD5
b52de48e7dc1dd2aa4daf7f0301e1237
-
SHA1
ce1c7493fd52e660e693faeb2bdb0f63c1b1d2b4
-
SHA256
9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf
-
SHA512
cf5c221609174e0cba0580cdfd2a76aab63850bb06b7a43119444b7896bd578044a1704b69b7935f2119827f0be0d9c0c0a1672eeddb3e27a0ee876d0805afec
-
SSDEEP
12288:ZNfqWZCJ6qvvMOn8dnSOuscD5I+2XZGcYqj7lDGZhQ61cunbs:ZNf7MdznD5S4cYiFGZhX+qI
Malware Config
Extracted
xworm
5.0
UxOlPOZZNwNV9srk
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/Dh8E7H3R
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2644-39-0x0000000000090000-0x00000000000A0000-memory.dmp family_xworm behavioral1/memory/2644-42-0x0000000000090000-0x00000000000A0000-memory.dmp family_xworm behavioral1/memory/2644-41-0x0000000000090000-0x00000000000A0000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2668 created 1180 2668 Partial.pif 21 PID 2668 created 1180 2668 Partial.pif 21 PID 2668 created 1180 2668 Partial.pif 21 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2668 Partial.pif 2644 RegAsm.exe 2772 VivaCraft.pif -
Loads dropped DLL 3 IoCs
pid Process 2524 cmd.exe 2668 Partial.pif 2644 RegAsm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2520 tasklist.exe 2420 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2428 PING.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2644 RegAsm.exe 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2520 tasklist.exe Token: SeDebugPrivilege 2420 tasklist.exe Token: SeDebugPrivilege 2644 RegAsm.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2668 Partial.pif 2668 Partial.pif 2668 Partial.pif 2772 VivaCraft.pif 2772 VivaCraft.pif 2772 VivaCraft.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2524 2188 9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe 28 PID 2188 wrote to memory of 2524 2188 9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe 28 PID 2188 wrote to memory of 2524 2188 9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe 28 PID 2188 wrote to memory of 2524 2188 9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe 28 PID 2524 wrote to memory of 2520 2524 cmd.exe 30 PID 2524 wrote to memory of 2520 2524 cmd.exe 30 PID 2524 wrote to memory of 2520 2524 cmd.exe 30 PID 2524 wrote to memory of 2520 2524 cmd.exe 30 PID 2524 wrote to memory of 2604 2524 cmd.exe 31 PID 2524 wrote to memory of 2604 2524 cmd.exe 31 PID 2524 wrote to memory of 2604 2524 cmd.exe 31 PID 2524 wrote to memory of 2604 2524 cmd.exe 31 PID 2524 wrote to memory of 2420 2524 cmd.exe 33 PID 2524 wrote to memory of 2420 2524 cmd.exe 33 PID 2524 wrote to memory of 2420 2524 cmd.exe 33 PID 2524 wrote to memory of 2420 2524 cmd.exe 33 PID 2524 wrote to memory of 2684 2524 cmd.exe 34 PID 2524 wrote to memory of 2684 2524 cmd.exe 34 PID 2524 wrote to memory of 2684 2524 cmd.exe 34 PID 2524 wrote to memory of 2684 2524 cmd.exe 34 PID 2524 wrote to memory of 2708 2524 cmd.exe 35 PID 2524 wrote to memory of 2708 2524 cmd.exe 35 PID 2524 wrote to memory of 2708 2524 cmd.exe 35 PID 2524 wrote to memory of 2708 2524 cmd.exe 35 PID 2524 wrote to memory of 2448 2524 cmd.exe 36 PID 2524 wrote to memory of 2448 2524 cmd.exe 36 PID 2524 wrote to memory of 2448 2524 cmd.exe 36 PID 2524 wrote to memory of 2448 2524 cmd.exe 36 PID 2524 wrote to memory of 2456 2524 cmd.exe 37 PID 2524 wrote to memory of 2456 2524 cmd.exe 37 PID 2524 wrote to memory of 2456 2524 cmd.exe 37 PID 2524 wrote to memory of 2456 2524 cmd.exe 37 PID 2524 wrote to memory of 2668 2524 cmd.exe 38 PID 2524 wrote to memory of 2668 2524 cmd.exe 38 PID 2524 wrote to memory of 2668 2524 cmd.exe 38 PID 2524 wrote to memory of 2668 2524 cmd.exe 38 PID 2524 wrote to memory of 2428 2524 cmd.exe 39 PID 2524 wrote to memory of 2428 2524 cmd.exe 39 PID 2524 wrote to memory of 2428 2524 cmd.exe 39 PID 2524 wrote to memory of 2428 2524 cmd.exe 39 PID 2668 wrote to memory of 2488 2668 Partial.pif 40 PID 2668 wrote to memory of 2488 2668 Partial.pif 40 PID 2668 wrote to memory of 2488 2668 Partial.pif 40 PID 2668 wrote to memory of 2488 2668 Partial.pif 40 PID 2668 wrote to memory of 2968 2668 Partial.pif 42 PID 2668 wrote to memory of 2968 2668 Partial.pif 42 PID 2668 wrote to memory of 2968 2668 Partial.pif 42 PID 2668 wrote to memory of 2968 2668 Partial.pif 42 PID 2488 wrote to memory of 2000 2488 cmd.exe 43 PID 2488 wrote to memory of 2000 2488 cmd.exe 43 PID 2488 wrote to memory of 2000 2488 cmd.exe 43 PID 2488 wrote to memory of 2000 2488 cmd.exe 43 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2668 wrote to memory of 2644 2668 Partial.pif 45 PID 2324 wrote to memory of 1676 2324 taskeng.exe 49 PID 2324 wrote to memory of 1676 2324 taskeng.exe 49 PID 2324 wrote to memory of 1676 2324 taskeng.exe 49
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe"C:\Users\Admin\AppData\Local\Temp\9a54f4b6e2fbffb5f0deb5ed5ceb6761a0e684f07c8df9c18078b057bbd0adcf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Counseling Counseling.cmd && Counseling.cmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:2604
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 552296454⤵PID:2708
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CLOCKLICENSINGDESCRIBEDASUS" Cialis4⤵PID:2448
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Objectives + Registration 55229645\y4⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\Partial.pif55229645\Partial.pif 55229645\y4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:2428
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Habitat" /tr "wscript //B 'C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js'" /sc minute /mo 5 /F2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Habitat" /tr "wscript //B 'C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js'" /sc minute /mo 5 /F3⤵
- Creates scheduled task(s)
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url" & echo URL="C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VivaCraft.url" & exit2⤵
- Drops startup file
PID:2968
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\RegAsm.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55229645\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {165146BE-1C60-47DC-B5B1-A8AA41D339D2} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.js"2⤵PID:1676
-
C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.pif"C:\Users\Admin\AppData\Local\VivaReality Studios\VivaCraft.pif" "C:\Users\Admin\AppData\Local\VivaReality Studios\R"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
212KB
MD5964350764b1d641eb6aed78942ca6348
SHA17f1c968200d5020bcd409b67a9e21f7ebb975a97
SHA256a63bbd788f5c1d9b67b6259a1d68d708d52dadf726b770775402282f40135171
SHA512e63f81f432e7dae1f5a37ce632a649455438975108b8e864d1c9f24fab3ced6eae2b64cfc3d89b9753728047ce2cde854ce0b14a7e6dbba1488ac53691c518f9
-
Filesize
175B
MD5d7c49067b84746e73f4da2824379abd2
SHA181f68c85f222cf4849a1b7bc6f8d00fa51a6bcf5
SHA256bb22e99f061a62ff538b76e773edb380b079ce152e9e56dcb626e63402454ae2
SHA512345ec51bf1aadfc89267ac749b8f4883fd27c326d532c08d45a43e8b98a3031586c67c1ef74cb73fd5a19b84845dc827db67198ca44cc126abca69c1a03020cb
-
Filesize
1KB
MD51c26a79d50bf38afe267928e7ea5d76d
SHA1ad2b0484de6775092b04d421c334796f4af43495
SHA2564c4306dabdd45c30ab94e9306463af6e33b6bee9639b1ce5fbcd5122cab6e024
SHA51243048e6299859c457f4f48643d3fb932387e3d446a2064a7cb97ebbd540c19c2aae726b7ed60f7a636080268dc90891c558d19b2c2316a4ef0d34d68449fcfb9
-
Filesize
11KB
MD568ab588b80948daa40f08f69bb7edf83
SHA12d04c116a0145c671001984e6f53f9b22c23a442
SHA25659d3b8d8d4c8b1468d9e1ead0d424c5b811dc96160882a39511a54614afa827e
SHA5125ea0728e76b2616c0533b755387b0c802a8cf53e01e5fde38c17ab783641d7ea6803c2b0b4c52aa1d4718e86cd429ca19252bc3c9600e8c5dcba3da540826c36
-
Filesize
28KB
MD519e7d22057332a2fcf0ccecf092f9ee0
SHA1123d3904ff805248a710f5ccfdb5174e49d8cf7a
SHA2566b79e3a66ffa77230ccdd788db7b2e001091f58ff77ca6d172baf4020d9af7a6
SHA512cc08c4b725adfcc7a2d7d574806d5c900030741bd04cc04eec18c52047523797d0bd3e87d23985a7f9078718b66e2f9f6861f25bdf106e9913c5c12ea1a8fd3c
-
Filesize
227KB
MD576427158ee86155fb3825b7eea3d3505
SHA1514486e2f2afaccf27e15f149951f7030cf60af0
SHA256c8ee8a02e081da3a177afbefebe08346e7b8bf82c95742dd0c5a3dc56b7ad790
SHA512592a096323cac70b433f2096837322e6e57ab79ec9ab7b799a18f4e6a19327708d17d503f9b5303c141347394937985788df5c267bbd59d3f31625cdafeebfaf
-
Filesize
279KB
MD5df4a08dc64af9dd0e620690bbd2cb7fd
SHA109e94e043562ac2842289d86495d6da5ba3a43fb
SHA2566ad5ac214c1c5d5689199d5068dbcd67abcc1a4103ce69173d772e86d302d9b7
SHA512042b411288969b4162ed1665bfe36155339090a9b9b45ca10c84521b66446c488fa942f23d28597831e6b337cefe8a40f2a5fb9d50bd62b7eee5bbc4de3a9daa
-
Filesize
124KB
MD56600275ba8b5dfd012de0e3b65722620
SHA12b563207afe0319a87ca698f886357bc790456ab
SHA25674fa376f8e97fd264e8dc874fb2b179a1c96f6fe20326e36a25136ff604e908b
SHA512f16e8aee2f44970a29893cfe95a8684f05c583e226676bac4eecd724e0c6602ec18eb9c51ba481c77054c29c06772942b73b3c21290a4080e0c1d6973752ab31
-
Filesize
170KB
MD5cecc88175e27a6b8387b029144d79dbb
SHA1a1489a447fd68a062cc60151e39ce53d7f0301bc
SHA25607100f5a1947860bfbb57e2a5d1e1d87f2b22c10be73dc2c2e5f7aac89a914f7
SHA512fc8f92df83aecc7debc9153f4e5d551855a9de7334934b424dd4ecf59ab80bd709a588e52ba941ac3da26fe757d36a201ae2e6a9584d33758735f86a2c872e5e
-
Filesize
42KB
MD50fdbe417956628b2af001ed68ed8d143
SHA173a35219a4ed027d6dc8d4776422428256cb505c
SHA2560e1673f1bcf015c103c4c3e61a27ef20b6076396c3a83a1e98310b0350747302
SHA51261f713b30dea488c5cbc6755b6edf89f4bb46297a1523ec8b1788b3ab95ab65980d7ade8d4e99658d2d43459b793847a34f1016483c54c5bd9c69540b4c3b88e
-
Filesize
213KB
MD58b6f7dc3cd0ac4cc213a41286fa81826
SHA14f3e0ddf9cd8f21f20c01dc7b666a361e4dce4fc
SHA2565003b4f848ff6a59af66a82c80e9ce0d31c70a24b0a034f39e052703ce33348a
SHA5129f5d1582ad48630f19d87df144c883195acab434d8185be12491ffad5402b4eb149b1e0bb64aa04688b55bc977ae3a46d447b6a2b6ffda4edd1fa63225f70a4b
-
Filesize
181B
MD526d6ab3699b22f116fff8262af7cc268
SHA11f590e2b2fd55cbf01e24e6a513d989d5333d5a0
SHA256e394cb43b276521ba392a31e1840ea285d2f47122d5a11a8899a1bc45687d645
SHA5120b8be554bc62efe08ecec6e5cd9a08ebaba61d05001d2ff7c9cb7a06680ff97c3d233cdddc913c4a7be1d6a75e4ea89586b11e294a908e977e8a919371bb41f3
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab