Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 22:24
Behavioral task
behavioral1
Sample
Funny.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Funny.exe
Resource
win10v2004-20240226-en
General
-
Target
Funny.exe
-
Size
38KB
-
MD5
90fc7afe1b516a9fa685089ae0f5f322
-
SHA1
94ee6cb901f16a3136607c0e194c1e76b5ac76d8
-
SHA256
a53ea993bd31a24b3620978a84164bba38f592eb01f4d4cfe9bc4ae1af99c4a4
-
SHA512
e3f5d77e6da170460d9bfa3273608397f3fb0bc98eb34ed1729c357681d449a443e54abf75259efceca98c1527e0ed6201154556a1e889b11901a1b53fb5f2c9
-
SSDEEP
768:lPDWCCqClY9UiX/anrEvr0GXFyc9BjQ6OO/hdDQnl+:lPDWPleUganrezF39xQ6OO/Wl+
Malware Config
Extracted
xworm
5.0
by-mit.gl.at.ply.gg:3500
MsPnnj1aWUGMygHH
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3932-1-0x0000000000220000-0x0000000000230000-memory.dmp family_xworm C:\ProgramData\program family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1160 powershell.exe 960 powershell.exe 2164 powershell.exe 2964 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Funny.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Funny.exe -
Drops startup file 2 IoCs
Processes:
Funny.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\program.lnk Funny.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\program.lnk Funny.exe -
Executes dropped EXE 1 IoCs
Processes:
programpid process 3024 program -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Funny.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\program = "C:\\ProgramData\\program" Funny.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Funny.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" Funny.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1160 powershell.exe 1160 powershell.exe 960 powershell.exe 960 powershell.exe 2164 powershell.exe 2164 powershell.exe 2964 powershell.exe 2964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
Funny.exepowershell.exepowershell.exepowershell.exepowershell.exeprogramdescription pid process Token: SeDebugPrivilege 3932 Funny.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 3932 Funny.exe Token: SeDebugPrivilege 3024 program -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Funny.exedescription pid process target process PID 3932 wrote to memory of 1160 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 1160 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 960 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 960 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 2164 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 2164 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 2964 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 2964 3932 Funny.exe powershell.exe PID 3932 wrote to memory of 1860 3932 Funny.exe schtasks.exe PID 3932 wrote to memory of 1860 3932 Funny.exe schtasks.exe PID 3932 wrote to memory of 1080 3932 Funny.exe msedge.exe PID 3932 wrote to memory of 1080 3932 Funny.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Funny.exe"C:\Users\Admin\AppData\Local\Temp\Funny.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Funny.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Funny.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\program'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'program'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "program" /tr "C:\ProgramData\program"2⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1412 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5044 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5760 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5544 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\ea37472b7ea04d4b88b57381d4173427 /t 2824 /p 42361⤵
-
C:\ProgramData\programC:\ProgramData\program1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\programFilesize
38KB
MD590fc7afe1b516a9fa685089ae0f5f322
SHA194ee6cb901f16a3136607c0e194c1e76b5ac76d8
SHA256a53ea993bd31a24b3620978a84164bba38f592eb01f4d4cfe9bc4ae1af99c4a4
SHA512e3f5d77e6da170460d9bfa3273608397f3fb0bc98eb34ed1729c357681d449a443e54abf75259efceca98c1527e0ed6201154556a1e889b11901a1b53fb5f2c9
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5be67063c62a242565760a02a642a9f02
SHA1d1043a892b44d6676f71b568f578fff947266a19
SHA25656f158298dc5f781d6636a0b15d040f9cffb1d46cd11079aa40a26b662217f48
SHA51290d2cbd882ff8043412ad25e74df0cf6b71d6f3fbdfa6f1efa0efc8eed86a925606c7d2e967f112a34d3f0e04f01a396898508571400dcf7e6fd69e78f406638
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD550d3033f2bc3a3774c469d03e71a79a9
SHA122027b1d52085de99b3bffa276530fea5d961471
SHA2562987e99ec7fa17bd4ab7de3cb4dc62645e1052012a5a357904d6fc6db9054147
SHA512ecf7ab1a9e4192454a3e24c60453fd702a8c648e00078fc933b9182f4a3d3c10c6f5da622a5729b35727e6ddc8837029caddcaf76f56e805b9744253b56da5d8
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3bxcw3il.swf.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENCFilesize
16B
MD5d012e5555ae6936cbe76b0edf9b0da69
SHA10a80fe68cdd19432d8f4ccae4b505613064f1966
SHA2567a35c4144ba71bf57b0fe01b116314ff31f3765cd6667c3d48def6fe1c4af861
SHA512920b93ad09eddab8b03be79bc8813abce6beaa0cbb37ff0a8d85c92c8940ce003bb03d967eaa84d22b01e00aabfab26e16c2d41fb2c56bd60bf08171cb130de6
-
memory/960-34-0x0000021DE5F80000-0x0000021DE60CE000-memory.dmpFilesize
1.3MB
-
memory/1160-20-0x000001BA42190000-0x000001BA422DE000-memory.dmpFilesize
1.3MB
-
memory/1160-3-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/1160-15-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/1160-21-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/1160-12-0x000001BA41FF0000-0x000001BA42012000-memory.dmpFilesize
136KB
-
memory/1160-4-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/1160-16-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/1160-17-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/2164-46-0x00000177FDDB0000-0x00000177FDEFE000-memory.dmpFilesize
1.3MB
-
memory/2964-58-0x000002A3F9EC0000-0x000002A3FA00E000-memory.dmpFilesize
1.3MB
-
memory/3932-2-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/3932-62-0x00007FFC8CBB3000-0x00007FFC8CBB5000-memory.dmpFilesize
8KB
-
memory/3932-63-0x00007FFC8CBB0000-0x00007FFC8D671000-memory.dmpFilesize
10.8MB
-
memory/3932-64-0x000000001BF50000-0x000000001BF5C000-memory.dmpFilesize
48KB
-
memory/3932-0-0x00007FFC8CBB3000-0x00007FFC8CBB5000-memory.dmpFilesize
8KB
-
memory/3932-1-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB