Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 07:37
Behavioral task
behavioral1
Sample
чит.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
чит.exe
Resource
win10v2004-20240508-en
General
-
Target
чит.exe
-
Size
357KB
-
MD5
bd6d062cca54d61661e7c67343e6ecbe
-
SHA1
e58f101d29b6525676ae97ecf98c654d5b9d2d13
-
SHA256
5e5f7e691250577c8d5a5037a797960ad7f12bba85d62400e482d1050b5bbd77
-
SHA512
727311a904693f2c467d2c752b3e3a2c21d067e71bb34a6722f2d7e0db50b48d17416712e1448495cff0edd759b0b0f875654c70aa0ac8f3c9ba03d622838095
-
SSDEEP
6144:lPkN4bN8fMNPg+GIIIIIIIhIIIIIIIIIIIIIIIU:9k5fMNPD
Malware Config
Extracted
xworm
0.tcp.ngrok.io:14338
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2180-1-0x0000000000BE0000-0x0000000000C40000-memory.dmp family_xworm behavioral1/files/0x000f00000001342b-33.dat family_xworm behavioral1/memory/1628-35-0x0000000000880000-0x00000000008E0000-memory.dmp family_xworm behavioral1/memory/2196-38-0x0000000000090000-0x00000000000F0000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2724 powershell.exe 2452 powershell.exe 2960 powershell.exe 2664 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game.lnk чит.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\game.lnk чит.exe -
Executes dropped EXE 2 IoCs
pid Process 1628 game 2196 game -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\game = "C:\\Users\\Admin\\AppData\\Local\\game" чит.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 6 0.tcp.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2664 powershell.exe 2724 powershell.exe 2452 powershell.exe 2960 powershell.exe 2180 чит.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2180 чит.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 2180 чит.exe Token: SeDebugPrivilege 1628 game Token: SeDebugPrivilege 2196 game -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 чит.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2664 2180 чит.exe 29 PID 2180 wrote to memory of 2664 2180 чит.exe 29 PID 2180 wrote to memory of 2664 2180 чит.exe 29 PID 2180 wrote to memory of 2724 2180 чит.exe 31 PID 2180 wrote to memory of 2724 2180 чит.exe 31 PID 2180 wrote to memory of 2724 2180 чит.exe 31 PID 2180 wrote to memory of 2452 2180 чит.exe 33 PID 2180 wrote to memory of 2452 2180 чит.exe 33 PID 2180 wrote to memory of 2452 2180 чит.exe 33 PID 2180 wrote to memory of 2960 2180 чит.exe 35 PID 2180 wrote to memory of 2960 2180 чит.exe 35 PID 2180 wrote to memory of 2960 2180 чит.exe 35 PID 2180 wrote to memory of 1700 2180 чит.exe 37 PID 2180 wrote to memory of 1700 2180 чит.exe 37 PID 2180 wrote to memory of 1700 2180 чит.exe 37 PID 936 wrote to memory of 1628 936 taskeng.exe 40 PID 936 wrote to memory of 1628 936 taskeng.exe 40 PID 936 wrote to memory of 1628 936 taskeng.exe 40 PID 936 wrote to memory of 2196 936 taskeng.exe 43 PID 936 wrote to memory of 2196 936 taskeng.exe 43 PID 936 wrote to memory of 2196 936 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\чит.exe"C:\Users\Admin\AppData\Local\Temp\чит.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\чит.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'чит.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\game'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'game'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "game" /tr "C:\Users\Admin\AppData\Local\game"2⤵
- Creates scheduled task(s)
PID:1700
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1DCDD498-EA18-4A41-863B-79F22488515B} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\gameC:\Users\Admin\AppData\Local\game2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\gameC:\Users\Admin\AppData\Local\game2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5bd6d062cca54d61661e7c67343e6ecbe
SHA1e58f101d29b6525676ae97ecf98c654d5b9d2d13
SHA2565e5f7e691250577c8d5a5037a797960ad7f12bba85d62400e482d1050b5bbd77
SHA512727311a904693f2c467d2c752b3e3a2c21d067e71bb34a6722f2d7e0db50b48d17416712e1448495cff0edd759b0b0f875654c70aa0ac8f3c9ba03d622838095
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b1ebce254991f5bd03b90cda0d299613
SHA122c540c9cc55b0da2e0868f2abbee835fb541a2a
SHA2567e6087ebd62da63e68c10f9049671dc4e353ab7076ffb5cbcead2057bbb741f5
SHA512afec90c4b52d2c381aa913db82671eb2ab9b7ffaadbd7df59865a56520a0414419dd8207bb2898d39d826c0d1413f55d4fff7cfb1cd20325ee6c95450bcfb43f