Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:26
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe
Resource
win7-20240215-en
windows7-x64
0 signatures
150 seconds
General
-
Target
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe
-
Size
11.8MB
-
MD5
13510ee957b93e9bc0d5f5f1ea2e981f
-
SHA1
befa9cebba6fb51d96543a079cfbb9fc08cd4dde
-
SHA256
13cee60c3b7075748252bda9170f1ef4bf89aa7a051669f4a359f65cfa59f7fc
-
SHA512
835e72432560d08d71abfe544ac712fc9c32d5d36185dff9b6282833f681237dc707889f7f93df58467a4402ee7a50522a2f46a3361e70be2ea521883c1b80f2
-
SSDEEP
196608:d/1NeAhlsGbOd4TPgUwrOZA0TQWKzpKhS/:dje8XbVTPgUwqZNxhS/
Malware Config
Extracted
Family
xworm
Version
5.0
C2
20.206.207.64:7000
Mutex
3fx4DGwKa2tqA8ov
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3816-13-0x0000000000720000-0x000000000072E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exedescription pid process target process PID 4424 created 3500 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe Explorer.EXE -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3816-13-0x0000000000720000-0x000000000072E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
UserAccountControlSettings.exedescription pid process target process PID 2596 set thread context of 3816 2596 UserAccountControlSettings.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exepid process 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exepid process 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 3816 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exeUserAccountControlSettings.exedescription pid process target process PID 4424 wrote to memory of 2596 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe UserAccountControlSettings.exe PID 4424 wrote to memory of 2596 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe UserAccountControlSettings.exe PID 4424 wrote to memory of 2596 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe UserAccountControlSettings.exe PID 4424 wrote to memory of 2596 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe UserAccountControlSettings.exe PID 4424 wrote to memory of 2596 4424 2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe UserAccountControlSettings.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe PID 2596 wrote to memory of 3816 2596 UserAccountControlSettings.exe vbc.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_13510ee957b93e9bc0d5f5f1ea2e981f_snatch.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\UserAccountControlSettings.exeC:\Windows\SysWOW64\UserAccountControlSettings.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816