Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:23
Behavioral task
behavioral1
Sample
0x0037000000015f54-11.exe
Resource
win7-20240221-en
General
-
Target
0x0037000000015f54-11.exe
-
Size
40KB
-
MD5
7ea387ab126b2ecf3365d448a318a433
-
SHA1
71b6e05898b68ed72ca95266d6293b225c40b612
-
SHA256
573f3d316ed68ea2d4762a657dcc62416b763a8fcd1f99017f02d3ef5c215015
-
SHA512
68830f84bf9f0a9e75a999907f7e7d816f89aa745e92078f56f303edadb236e14957e0594290f297fd4c0175ae72be02542cabe974a404fe961b7ab4bf945825
-
SSDEEP
768:lNfPMSk3K/EzTb/0X8WuFZ4sJF5PC9O9d968OMhM3/qj:jf05a/CTjS89/Fc9Ud968OMiY
Malware Config
Extracted
xworm
5.0
45.141.27.41:7000
9ZF9ZsOZGh1T1r1n
-
Install_directory
%Public%
-
install_file
csrss.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4376-1-0x0000000000010000-0x0000000000020000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2036 powershell.exe 628 powershell.exe 4760 powershell.exe 992 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0x0037000000015f54-11.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 0x0037000000015f54-11.exe -
Drops startup file 2 IoCs
Processes:
0x0037000000015f54-11.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk 0x0037000000015f54-11.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk 0x0037000000015f54-11.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe0x0037000000015f54-11.exepid process 2036 powershell.exe 2036 powershell.exe 2036 powershell.exe 628 powershell.exe 628 powershell.exe 628 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 992 powershell.exe 992 powershell.exe 992 powershell.exe 4376 0x0037000000015f54-11.exe 4376 0x0037000000015f54-11.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
0x0037000000015f54-11.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4376 0x0037000000015f54-11.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 4376 0x0037000000015f54-11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0x0037000000015f54-11.exepid process 4376 0x0037000000015f54-11.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0x0037000000015f54-11.exedescription pid process target process PID 4376 wrote to memory of 2036 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 2036 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 628 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 628 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 4760 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 4760 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 992 4376 0x0037000000015f54-11.exe powershell.exe PID 4376 wrote to memory of 992 4376 0x0037000000015f54-11.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0037000000015f54-11.exe"C:\Users\Admin\AppData\Local\Temp\0x0037000000015f54-11.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\0x0037000000015f54-11.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '0x0037000000015f54-11.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4400,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e60eb305a7b2d9907488068b7065abd3
SHA11643dd7f915ac50c75bc01c53d68c5dafb9ce28d
SHA256ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135
SHA51295c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_21zuf2fi.1n3.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/2036-3-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB
-
memory/2036-14-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB
-
memory/2036-15-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB
-
memory/2036-18-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB
-
memory/2036-9-0x00000182F8F40000-0x00000182F8F62000-memory.dmpFilesize
136KB
-
memory/4376-0-0x00007FFBF90F3000-0x00007FFBF90F5000-memory.dmpFilesize
8KB
-
memory/4376-2-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB
-
memory/4376-1-0x0000000000010000-0x0000000000020000-memory.dmpFilesize
64KB
-
memory/4376-57-0x00007FFBF90F3000-0x00007FFBF90F5000-memory.dmpFilesize
8KB
-
memory/4376-58-0x00007FFBF90F0000-0x00007FFBF9BB1000-memory.dmpFilesize
10.8MB