Resubmissions
01-05-2024 04:51
240501-fhbe7sgc8w 101-05-2024 04:43
240501-fch8vsga9z 1001-05-2024 04:43
240501-fcbh1sac65 401-05-2024 04:42
240501-fb44yaga8s 101-05-2024 04:42
240501-fbt9qsac53 401-05-2024 04:41
240501-fbf24sga6x 101-05-2024 04:40
240501-fahjjsga4s 401-05-2024 04:38
240501-e9jp8aga2s 401-05-2024 04:34
240501-e67ymsfh4y 10Analysis
-
max time kernel
12s -
max time network
11s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-05-2024 04:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
Resource
win11-20240426-en
General
-
Target
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133590121279415898" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 572 chrome.exe 572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 572 chrome.exe 572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 572 wrote to memory of 1512 572 chrome.exe 79 PID 572 wrote to memory of 1512 572 chrome.exe 79 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 1460 572 chrome.exe 81 PID 572 wrote to memory of 2124 572 chrome.exe 82 PID 572 wrote to memory of 2124 572 chrome.exe 82 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83 PID 572 wrote to memory of 5036 572 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9b66eab58,0x7ff9b66eab68,0x7ff9b66eab782⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:22⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2156 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:82⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1820,i,18315865095323479414,4007049913315954184,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f82bb50d0076dfab945153ac4d861270
SHA15b4650bbf29371b4db6347202eb1b4fe80fc4d66
SHA25601152461afa6dc0911e8d66f6418e4776eb6e926617b9e0025c6ed57b3269962
SHA512f5cb47a617f87e55e5720eaf365f841119daaa9026519df141adac9cee39c3ac6182eeb45f4f94d489032fd65149ad60d87441b78f9efa4f56a68e3ec41b1516
-
Filesize
7KB
MD51315a21240598510786dfb136859d8a4
SHA16f8d3f65ec750f3d7097fe3dc0cda48f3589f090
SHA25601e256770d8c74d7bb46143deb3fbdc9f30569fbd7b5d3aadc0b65300af92bc0
SHA51235228e8ed16e66d1c6417d68d04d50fdb62fdd4a6a641a2649d80a914bd78775270baf0dfa43dfd51d14b143332b0deba2abd9bc245f843fe5f60c780259eee5
-
Filesize
130KB
MD5b853cea3baba6f4ac8130b9f2815923c
SHA159241ef025cd916924192f61b28916e2b2c36f2c
SHA256860b836555978d9c4d1f5d363a489570ccde12c6dc78ae4b73337ce0c7f3c018
SHA512ef48527af2dd3d14c09ac87e37d4dc955e88bf156e5d09b5810ef6aa4ebb1868d6a758379e0f9a9c9d780c1a4838d9ca22a45e9bf924bb67efcff8c53a15e8d6