Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 22:38
Behavioral task
behavioral1
Sample
bb1529af37bcc44a4d65ee8da4ab05be.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bb1529af37bcc44a4d65ee8da4ab05be.exe
Resource
win10v2004-20240508-en
General
-
Target
bb1529af37bcc44a4d65ee8da4ab05be.exe
-
Size
80KB
-
MD5
bb1529af37bcc44a4d65ee8da4ab05be
-
SHA1
2e0e4ddd78ff20ec2de8fb8993a0649cabfeedd2
-
SHA256
675904e6ddfe4d5801da49bb4935fc71859e4edf5879a8c173f1f7df35c3970a
-
SHA512
2a8fb12264df2f6bdf272fa585e2b5b27829e9f96813a5d349da2a7c8348cd3eb9097f5d10f3320f1ab192041d0274cd2ac4c0d9bcd0d716e33f1dc6162baf7b
-
SSDEEP
1536:Gmc2zu/kU4Nl5jZnttCahWtrbazbwq6Kciw6VaZwYVg/VOZO6Kmi80:GmcT8UEntH4trbaYhKc8OZxK+0
Malware Config
Extracted
xworm
82.147.85.135:7000
-
Install_directory
%AppData%
-
install_file
svhost.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/1284-1-0x0000000001150000-0x000000000116A000-memory.dmp family_xworm behavioral1/files/0x000f00000001226c-33.dat family_xworm behavioral1/memory/2004-37-0x0000000001290000-0x00000000012AA000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2708 powershell.exe 2680 powershell.exe 3040 powershell.exe 2684 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk bb1529af37bcc44a4d65ee8da4ab05be.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk bb1529af37bcc44a4d65ee8da4ab05be.exe -
Executes dropped EXE 2 IoCs
pid Process 2908 svhost.exe 2004 svhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhost = "C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe" bb1529af37bcc44a4d65ee8da4ab05be.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2708 powershell.exe 2680 powershell.exe 3040 powershell.exe 2684 powershell.exe 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe Token: SeDebugPrivilege 2908 svhost.exe Token: SeDebugPrivilege 2004 svhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2708 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 29 PID 1284 wrote to memory of 2708 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 29 PID 1284 wrote to memory of 2708 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 29 PID 1284 wrote to memory of 2680 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 31 PID 1284 wrote to memory of 2680 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 31 PID 1284 wrote to memory of 2680 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 31 PID 1284 wrote to memory of 3040 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 33 PID 1284 wrote to memory of 3040 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 33 PID 1284 wrote to memory of 3040 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 33 PID 1284 wrote to memory of 2684 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 35 PID 1284 wrote to memory of 2684 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 35 PID 1284 wrote to memory of 2684 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 35 PID 1284 wrote to memory of 1956 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 37 PID 1284 wrote to memory of 1956 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 37 PID 1284 wrote to memory of 1956 1284 bb1529af37bcc44a4d65ee8da4ab05be.exe 37 PID 552 wrote to memory of 2908 552 taskeng.exe 42 PID 552 wrote to memory of 2908 552 taskeng.exe 42 PID 552 wrote to memory of 2908 552 taskeng.exe 42 PID 552 wrote to memory of 2004 552 taskeng.exe 43 PID 552 wrote to memory of 2004 552 taskeng.exe 43 PID 552 wrote to memory of 2004 552 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb1529af37bcc44a4d65ee8da4ab05be.exe"C:\Users\Admin\AppData\Local\Temp\bb1529af37bcc44a4d65ee8da4ab05be.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bb1529af37bcc44a4d65ee8da4ab05be.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bb1529af37bcc44a4d65ee8da4ab05be.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svhost" /tr "C:\Users\Admin\AppData\Roaming\svhost.exe"2⤵
- Creates scheduled task(s)
PID:1956
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1E6E22CC-AF42-4A1F-B18F-4CBE79213CEC} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HPS84YCRZZ050TF1YVLN.temp
Filesize7KB
MD5770fb019c13bf1864e1a81b62feede6b
SHA134e7dc952cdbd1cd53691dc1f006d7240b1f9b21
SHA256094a7365f78b3e232b0bdfa6c47ae8d2b428f59fa411d3a34612b9b73aa745a6
SHA5120d68ad7aa77efe98a683623f6163968d4207122e6ad267ac65768b1adec6eaa9791c0173c67db1238d6035696eeb4f2db45e6aac37e5b894e2dc76e6b55ab699
-
Filesize
80KB
MD5bb1529af37bcc44a4d65ee8da4ab05be
SHA12e0e4ddd78ff20ec2de8fb8993a0649cabfeedd2
SHA256675904e6ddfe4d5801da49bb4935fc71859e4edf5879a8c173f1f7df35c3970a
SHA5122a8fb12264df2f6bdf272fa585e2b5b27829e9f96813a5d349da2a7c8348cd3eb9097f5d10f3320f1ab192041d0274cd2ac4c0d9bcd0d716e33f1dc6162baf7b