Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 18:24
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240419-en
General
-
Target
file.exe
-
Size
57KB
-
MD5
8017a1bc98f4fdb536bef45a99951805
-
SHA1
d0896c713baa2873bda66c77469763c95dad7248
-
SHA256
f4deeaeaf6a4173c46ef5df50139cd54d144dc0cc0d685b2717c1590cc8b1b1b
-
SHA512
4a931e8ed6a3d5e547c4925b026d46be660f33b5c427721032df2ca5ad380b3e1abf215355fef911bc148784d4acf71c2e8ac4b729e6c4700cf8a2325a3b2152
-
SSDEEP
1536:mMA5VMU4wbWW8C5BkbvGoB264yLV6gQOXQz:mMA5VCwbWHkBkbv9gA0gQOXK
Malware Config
Extracted
xworm
publisher-misc.gl.at.ply.gg:58207:58207
publisher-misc.gl.at.ply.gg:58207
-
Install_directory
%Temp%
-
install_file
RuntimeBroker.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2364-1-0x0000000000F20000-0x0000000000F34000-memory.dmp family_xworm -
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2920 powershell.exe 2744 powershell.exe 2680 powershell.exe 2524 powershell.exe -
Drops startup file 2 IoCs
Processes:
file.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk file.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk file.exe -
Executes dropped EXE 1 IoCs
Processes:
lktjyt.exepid process 1588 lktjyt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1992 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 628 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2920 powershell.exe 2744 powershell.exe 2680 powershell.exe 2524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
file.exepowershell.exepowershell.exepowershell.exepowershell.exelktjyt.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2364 file.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 1588 lktjyt.exe Token: SeDebugPrivilege 628 taskkill.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
file.exelktjyt.execmd.exedescription pid process target process PID 2364 wrote to memory of 2920 2364 file.exe powershell.exe PID 2364 wrote to memory of 2920 2364 file.exe powershell.exe PID 2364 wrote to memory of 2920 2364 file.exe powershell.exe PID 2364 wrote to memory of 2744 2364 file.exe powershell.exe PID 2364 wrote to memory of 2744 2364 file.exe powershell.exe PID 2364 wrote to memory of 2744 2364 file.exe powershell.exe PID 2364 wrote to memory of 2680 2364 file.exe powershell.exe PID 2364 wrote to memory of 2680 2364 file.exe powershell.exe PID 2364 wrote to memory of 2680 2364 file.exe powershell.exe PID 2364 wrote to memory of 2524 2364 file.exe powershell.exe PID 2364 wrote to memory of 2524 2364 file.exe powershell.exe PID 2364 wrote to memory of 2524 2364 file.exe powershell.exe PID 2364 wrote to memory of 1588 2364 file.exe lktjyt.exe PID 2364 wrote to memory of 1588 2364 file.exe lktjyt.exe PID 2364 wrote to memory of 1588 2364 file.exe lktjyt.exe PID 2364 wrote to memory of 1588 2364 file.exe lktjyt.exe PID 1588 wrote to memory of 1896 1588 lktjyt.exe cmd.exe PID 1588 wrote to memory of 1896 1588 lktjyt.exe cmd.exe PID 1588 wrote to memory of 1896 1588 lktjyt.exe cmd.exe PID 1588 wrote to memory of 1896 1588 lktjyt.exe cmd.exe PID 1896 wrote to memory of 1500 1896 cmd.exe chcp.com PID 1896 wrote to memory of 1500 1896 cmd.exe chcp.com PID 1896 wrote to memory of 1500 1896 cmd.exe chcp.com PID 1896 wrote to memory of 1500 1896 cmd.exe chcp.com PID 1896 wrote to memory of 628 1896 cmd.exe taskkill.exe PID 1896 wrote to memory of 628 1896 cmd.exe taskkill.exe PID 1896 wrote to memory of 628 1896 cmd.exe taskkill.exe PID 1896 wrote to memory of 628 1896 cmd.exe taskkill.exe PID 1896 wrote to memory of 1992 1896 cmd.exe timeout.exe PID 1896 wrote to memory of 1992 1896 cmd.exe timeout.exe PID 1896 wrote to memory of 1992 1896 cmd.exe timeout.exe PID 1896 wrote to memory of 1992 1896 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\file.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\lktjyt.exe"C:\Users\Admin\AppData\Local\Temp\lktjyt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp5E84.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 15884⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lktjyt.exeFilesize
1.6MB
MD56627adf7167ee571e8fd6c8b1a0e8ae3
SHA103b9112660ee73c59d84e219f15bf24ae9df48db
SHA2566c5935bcddaa1d4f809487f66db758e892cc0a7fd7704d138904bc879644ea1f
SHA512e05896a6e0d09d4dafeb2467395ca06ae1e728a4aa079041dea82940caeb71646984604fdeea482748423b10257b8462db4f573682f9f719939143fdb5691c60
-
C:\Users\Admin\AppData\Local\Temp\tmp5E84.tmp.batFilesize
57B
MD511184bca4ce016b9e00b3ead32c9b16b
SHA1406adb50b7e2fbf0661a01219adede3680d12aaa
SHA256dba695fd11bd2141aaec8516df5de78b9fd8b62506fba0154af38f68681c36f0
SHA5124435aced15e4d51f423e23e7919b13bc39188f48f74ce12e87ea1a7b4dfff12ff3efb832e1d02115548c221553d0a36f0e4b3a14fe71ca2232ca04c16edf0e31
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5609d7a90c687e69f4bdfbd0b3b4fb590
SHA1a39ba8f17c8116eac74bc5b83434a249df3eff83
SHA2564713ff7ea6fa9968b3664a42758955b59913e4b92b7dde98ce1d06a1ce7bb002
SHA5123cfbee6d27527c5998c391f250d6d149643072815e01854c79b0e84e4b6edb32321a8ecb2b88e4b964c9471535141ee310b946b160cf769905b999a239b63883
-
memory/1588-37-0x00000000011C0000-0x0000000001352000-memory.dmpFilesize
1.6MB
-
memory/2364-39-0x000000001D370000-0x000000001D6C0000-memory.dmpFilesize
3.3MB
-
memory/2364-30-0x000000001B1D0000-0x000000001B250000-memory.dmpFilesize
512KB
-
memory/2364-38-0x0000000000890000-0x000000000089E000-memory.dmpFilesize
56KB
-
memory/2364-0-0x000007FEF4CA3000-0x000007FEF4CA4000-memory.dmpFilesize
4KB
-
memory/2364-40-0x000007FEF4CA3000-0x000007FEF4CA4000-memory.dmpFilesize
4KB
-
memory/2364-1-0x0000000000F20000-0x0000000000F34000-memory.dmpFilesize
80KB
-
memory/2364-43-0x000000001B1D0000-0x000000001B250000-memory.dmpFilesize
512KB
-
memory/2744-14-0x000000001B6C0000-0x000000001B9A2000-memory.dmpFilesize
2.9MB
-
memory/2744-15-0x0000000001D80000-0x0000000001D88000-memory.dmpFilesize
32KB
-
memory/2920-8-0x0000000001E10000-0x0000000001E18000-memory.dmpFilesize
32KB
-
memory/2920-7-0x000000001B8E0000-0x000000001BBC2000-memory.dmpFilesize
2.9MB
-
memory/2920-6-0x00000000029F0000-0x0000000002A70000-memory.dmpFilesize
512KB