Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:15
Behavioral task
behavioral1
Sample
peepeemonster.exe
Resource
win10v2004-20240426-en
General
-
Target
peepeemonster.exe
-
Size
81KB
-
MD5
fc5e9d5c2fd3a2864e889a60c64a3f9f
-
SHA1
216f69bb7b4c97c3c19d91cc2c0f410783fd661e
-
SHA256
7e1c2e3a716890993addd3604b267907b60e8d5c0a55e1428515777b73137b53
-
SHA512
1ac5e3b42acfd7d2504589f9c06f1e2fea5ba9682fef5d18a073a2af209630567cdce0478d373a1474c20d53d830dc75a58b688c7f649d687763b89bbb40976b
-
SSDEEP
1536:luE+uvqIX09IsIoqpNWnAtcRbQlHEctxnwi8JfDn+cYurOZtSFxmjHRW:wUq4JdoqpttcRbQlHQkcYEOvQyW
Malware Config
Extracted
xworm
104.28.242.8:7000
-
Install_directory
%ProgramData%
-
install_file
..exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1776-1-0x00000000003F0000-0x000000000040A000-memory.dmp family_xworm -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation peepeemonster.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\..lnk peepeemonster.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\..lnk peepeemonster.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\. = "C:\\ProgramData\\..exe" peepeemonster.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1776 peepeemonster.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1776 peepeemonster.exe Token: SeDebugPrivilege 1776 peepeemonster.exe Token: SeDebugPrivilege 740 taskmgr.exe Token: SeSystemProfilePrivilege 740 taskmgr.exe Token: SeCreateGlobalPrivilege 740 taskmgr.exe Token: 33 740 taskmgr.exe Token: SeIncBasePriorityPrivilege 740 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe 740 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 peepeemonster.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4568 1776 peepeemonster.exe 88 PID 1776 wrote to memory of 4568 1776 peepeemonster.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\peepeemonster.exe"C:\Users\Admin\AppData\Local\Temp\peepeemonster.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "." /tr "C:\ProgramData\..exe"2⤵
- Creates scheduled task(s)
PID:4568
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1