Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe
Resource
win7-20240221-en
General
-
Target
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe
-
Size
560KB
-
MD5
4a5f7263d5e978024e4d3c7abed82307
-
SHA1
0a8f9bb8e9058beb4bd67ea08b8ef82bc90fcd8c
-
SHA256
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf
-
SHA512
d843fe704beeb3b61916c789626bc908eed44455a34a86a65994db47c759311aef05c4f2d1530f2f073e99e6bdf3dc2b15944772fee7d161b492e70ba8a09c22
-
SSDEEP
12288:IzxKn6yWn7fcpVZlu/6uHqa9XnWsh9P5u7JwdprNLUgNYGutA:rn698VVYFlRu7J6ZUgNiA
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2840-10-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2840-13-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2840-9-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2840-17-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2840-15-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm -
Detects Windows executables referencing non-Windows User-Agents 5 IoCs
resource yara_rule behavioral1/memory/2840-10-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2840-13-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2840-9-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2840-17-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2840-15-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1536 powershell.exe 2476 powershell.exe 2784 powershell.exe 2696 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Loads dropped DLL 1 IoCs
pid Process 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2696 powershell.exe 1536 powershell.exe 2476 powershell.exe 2784 powershell.exe 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 1504 wrote to memory of 2840 1504 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 28 PID 2840 wrote to memory of 2696 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 29 PID 2840 wrote to memory of 2696 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 29 PID 2840 wrote to memory of 2696 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 29 PID 2840 wrote to memory of 2696 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 29 PID 2840 wrote to memory of 1536 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 31 PID 2840 wrote to memory of 1536 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 31 PID 2840 wrote to memory of 1536 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 31 PID 2840 wrote to memory of 1536 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 31 PID 2840 wrote to memory of 2476 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 33 PID 2840 wrote to memory of 2476 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 33 PID 2840 wrote to memory of 2476 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 33 PID 2840 wrote to memory of 2476 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 33 PID 2840 wrote to memory of 2784 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 35 PID 2840 wrote to memory of 2784 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 35 PID 2840 wrote to memory of 2784 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 35 PID 2840 wrote to memory of 2784 2840 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5869e2008860c190e9c10341c11ae6a6a
SHA17241bc84a7d54d89d638eec9eef764949596a26f
SHA256db363f004914aa170a51d3ae9ace7eccf8642233303b13d36b7b3de99a040ee4
SHA5122331dfa209c35070133fb12e76ee2fa8c35553c964de144cc64db5ed11e938d563bf72beccda77c5451a8348a7077233e366e676ce6ce327c7423894c70250a6
-
Filesize
560KB
MD54a5f7263d5e978024e4d3c7abed82307
SHA10a8f9bb8e9058beb4bd67ea08b8ef82bc90fcd8c
SHA2564fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf
SHA512d843fe704beeb3b61916c789626bc908eed44455a34a86a65994db47c759311aef05c4f2d1530f2f073e99e6bdf3dc2b15944772fee7d161b492e70ba8a09c22