Resubmissions
03-05-2024 18:03
240503-wm852acc9z 1003-05-2024 18:02
240503-wmldzacc8x 1003-05-2024 18:02
240503-wmksfafc32 1003-05-2024 18:00
240503-wlpd8scc6x 1003-05-2024 18:00
240503-wlngyafb95 1003-05-2024 18:00
240503-wlm66sfb94 1003-05-2024 18:00
240503-wlmweacc6v 1003-05-2024 18:00
240503-wll9wafb92 1003-05-2024 18:00
240503-wlly4sfb89 1003-05-2024 18:00
240503-wllncafb88 10Analysis
-
max time kernel
69s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 18:03
Behavioral task
behavioral1
Sample
ent.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ent.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ent.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
ent.exe
-
Size
44KB
-
MD5
211661398474b9c96a1d704823d0e552
-
SHA1
5afcd1a87a69ea1c84a06fdf7079660133ceb28a
-
SHA256
c43fa1f0bbfbb8f91d9a339b97922494bf790c6b58bf973b56836ef52a3196cd
-
SHA512
51717923b8d063874d5216db14adbe506826715773845c17961c5e52ed072380ea8b9b75d55559f855e6f42c35c8dd984c055eb3d1f7bec02c62463423c96666
-
SSDEEP
768:trlZa605WoOu+tpBERbGTHDUgkbZCfr2A33O3sh0l0E:tfq0u+tpKbAjXkbZCjjO3s60E
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/XzLzRHpk
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1632-1-0x0000000000D10000-0x0000000000D22000-memory.dmp family_xworm -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 pastebin.com 6 0.tcp.eu.ngrok.io 8 0.tcp.eu.ngrok.io 4 pastebin.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1632 ent.exe Token: SeShutdownPrivilege 1400 shutdown.exe Token: SeRemoteShutdownPrivilege 1400 shutdown.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1400 1632 ent.exe 32 PID 1632 wrote to memory of 1400 1632 ent.exe 32 PID 1632 wrote to memory of 1400 1632 ent.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ent.exe"C:\Users\Admin\AppData\Local\Temp\ent.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2344
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2348