Analysis

  • max time kernel
    680s
  • max time network
    675s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-06-2024 23:50

General

  • Target

    sexy.rar

  • Size

    34.5MB

  • MD5

    f4354a27cbafe881d0c2a30406cab030

  • SHA1

    281c0858f86e86acbd61e5bb64959bd222495e13

  • SHA256

    264c33358030655653d02cf653ca7f2e56a897b28689cdb35e015259afb71731

  • SHA512

    7918468c337fb7ed2874ec7c12470cb33b8b750a74179c41bfe4abe5ed93f4e605e60324702cb4c5c80ad7473f805713886c447beb7555350cb0c6bc8f74ee62

  • SSDEEP

    786432:lLMurnAMcuqEsgOvELxk7LGi7PPczRy3kJFTAa3NtQH/eC:lo6nAPUJ4Si7cVy3kAg2/B

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sexy.rar
    1⤵
    • Modifies registry class
    PID:4448
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4924
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4600
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\sexy\" -spe -an -ai#7zMap13575:88:7zEvent17601
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1608
    • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe
      "C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4776
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2880
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5088
      • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe
        "C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"
        1⤵
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2000
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:1468
        • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe
          "C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"
          1⤵
          • Executes dropped EXE
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2144
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AAB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA005F5F473C14F3696A86A47FD3AC62.TMP"
              3⤵
                PID:3228
          • C:\Windows\system32\wbem\WmiApSrv.exe
            C:\Windows\system32\wbem\WmiApSrv.exe
            1⤵
              PID:4020

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Execution

            Scripting

            1
            T1064

            Defense Evasion

            Scripting

            1
            T1064

            Discovery

            System Information Discovery

            2
            T1082

            Query Registry

            1
            T1012

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xworm V5.6.exe.log
              Filesize

              1KB

              MD5

              8e0f23092b7a620dc2f45b4a9a596029

              SHA1

              58cc7c47602c73529e91ff9db3c74ff05459e4ea

              SHA256

              58b9918225aee046894cb3c6263687bfe4b5a5b8dff7196d72687d0f3f735034

              SHA512

              be458f811ad6a1f6b320e8d3e68e71062a8de686bae77c400d65091947b805c95024f3f1837e088cf5ecac5388d36f354285a6b57f91ea55567f19706128a043

            • C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.0.vb
              Filesize

              78KB

              MD5

              66836c766dcc211f911a4e39e3e69981

              SHA1

              7d098efe4c98e1d91cf4a18bb1c2152fb6c43f5a

              SHA256

              7d4c1a4255eaa7f18f3d627bbc5d4c3cbd8fcf17d35d0f4807478de375fe9ea1

              SHA512

              8c7bed1205bec1f401905eb52c4870c346de7ba7794bc53d82cb32417587573cac66d400af625d41f907156ad40d6d08de94e79adee591b2bc6ffff0c997eab9

            • C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.cmdline
              Filesize

              292B

              MD5

              f7e3232f7b144ff28ca9eb34328580c8

              SHA1

              38abebf59986c82518de76de56137773d4921020

              SHA256

              117dafe3a4705d449528e5e09d4b07c0f2542ac121872b73bb1b5bf1607a23a1

              SHA512

              be2721fa375ca0cfaa56affa28839f4d1f7d6ae16df1a1d99b683b54a0b669fba6d6ec78d8c6546f1794b3f9fbc339588aa0fe31672581ef50e231066f6f858c

            • C:\Users\Admin\AppData\Local\Temp\RES8AAB.tmp
              Filesize

              1KB

              MD5

              81e47cd11acfd797fcfbcc19ca6014aa

              SHA1

              247c066f0f2a05250fecc920b7c41ceec7dec5cb

              SHA256

              d3269b1b8a24998f26b3e7e40603600e54595eaf4882e5d13ce583384d235727

              SHA512

              fbf8ff7bb6212530185e22cc5adcecce5711a8999d303faf314fbd61ed96e214d7482946a949a78c90fefb67bd527935d4f655e415e5576369209f153dc5418c

            • C:\Users\Admin\AppData\Local\Temp\sexy\ClientsFolder\F26943D0D149AD3F4279\Recovery\RecoveryData\cookies.json
              Filesize

              2B

              MD5

              d751713988987e9331980363e24189ce

              SHA1

              97d170e1550eee4afc0af065b78cda302a97674c

              SHA256

              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

              SHA512

              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

            • C:\Users\Admin\AppData\Local\Temp\sexy\GeoIP.dat
              Filesize

              1.2MB

              MD5

              8ef41798df108ce9bd41382c9721b1c9

              SHA1

              1e6227635a12039f4d380531b032bf773f0e6de0

              SHA256

              bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

              SHA512

              4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

            • C:\Users\Admin\AppData\Local\Temp\sexy\Guna.UI2.dll
              Filesize

              1.9MB

              MD5

              bcc0fe2b28edd2da651388f84599059b

              SHA1

              44d7756708aafa08730ca9dbdc01091790940a4f

              SHA256

              c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

              SHA512

              3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

            • C:\Users\Admin\AppData\Local\Temp\sexy\Icons\icon (15).ico
              Filesize

              361KB

              MD5

              e3143e8c70427a56dac73a808cba0c79

              SHA1

              63556c7ad9e778d5bd9092f834b5cc751e419d16

              SHA256

              b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

              SHA512

              74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

            • C:\Users\Admin\AppData\Local\Temp\sexy\SimpleObfuscator.dll
              Filesize

              1.4MB

              MD5

              9043d712208178c33ba8e942834ce457

              SHA1

              e0fa5c730bf127a33348f5d2a5673260ae3719d1

              SHA256

              b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

              SHA512

              dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

            • C:\Users\Admin\AppData\Local\Temp\sexy\Sounds\Intro.wav
              Filesize

              238KB

              MD5

              ad3b4fae17bcabc254df49f5e76b87a6

              SHA1

              1683ff029eebaffdc7a4827827da7bb361c8747e

              SHA256

              e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

              SHA512

              3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

            • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe
              Filesize

              14.9MB

              MD5

              56ccb739926a725e78a7acf9af52c4bb

              SHA1

              5b01b90137871c3c8f0d04f510c4d56b23932cbc

              SHA256

              90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

              SHA512

              2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

            • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe
              Filesize

              7.1MB

              MD5

              c464e152cccc8b6b8c31a2f2f2c47f56

              SHA1

              6f33badc5bf718775f7e8e403b5804b7dc936735

              SHA256

              4636f65685d60199313f678502dc00d03f6007a96568187f47e5c3f09f5b9a59

              SHA512

              097bb2e5a7ff944ce59470b64cb18cec1a660c9f009b3244aac81bd128469521fa97ec7af86309469df1acaa40cfe8c9b72835bc56f9397d9739a99f27befa48

            • C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe.config
              Filesize

              183B

              MD5

              66f09a3993dcae94acfe39d45b553f58

              SHA1

              9d09f8e22d464f7021d7f713269b8169aed98682

              SHA256

              7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

              SHA512

              c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

            • C:\Users\Admin\AppData\Local\Temp\vbcA005F5F473C14F3696A86A47FD3AC62.TMP
              Filesize

              1KB

              MD5

              d40c58bd46211e4ffcbfbdfac7c2bb69

              SHA1

              c5cf88224acc284a4e81bd612369f0e39f3ac604

              SHA256

              01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

              SHA512

              48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

            • memory/2000-347-0x000001EF41F20000-0x000001EF41F66000-memory.dmp
              Filesize

              280KB

            • memory/2000-351-0x000001EF41FC0000-0x000001EF41FCB000-memory.dmp
              Filesize

              44KB

            • memory/2000-348-0x000001EF41F00000-0x000001EF41F09000-memory.dmp
              Filesize

              36KB

            • memory/2000-349-0x000001EF41F90000-0x000001EF41F9D000-memory.dmp
              Filesize

              52KB

            • memory/2000-350-0x000001EF41FA0000-0x000001EF41FBE000-memory.dmp
              Filesize

              120KB

            • memory/2144-445-0x0000026BFC350000-0x0000026BFC4B8000-memory.dmp
              Filesize

              1.4MB

            • memory/4776-325-0x000002352F980000-0x000002352F989000-memory.dmp
              Filesize

              36KB

            • memory/4776-341-0x000002352F980000-0x000002352F989000-memory.dmp
              Filesize

              36KB

            • memory/4776-340-0x000002352F930000-0x000002352F976000-memory.dmp
              Filesize

              280KB

            • memory/4776-342-0x000002352F9B0000-0x000002352F9BD000-memory.dmp
              Filesize

              52KB

            • memory/4776-326-0x000002352F9B0000-0x000002352F9BD000-memory.dmp
              Filesize

              52KB

            • memory/4776-343-0x000002352F9C0000-0x000002352F9DE000-memory.dmp
              Filesize

              120KB

            • memory/4776-324-0x000002352F930000-0x000002352F976000-memory.dmp
              Filesize

              280KB

            • memory/4776-344-0x000002352F9E0000-0x000002352F9EB000-memory.dmp
              Filesize

              44KB

            • memory/4776-327-0x000002352F9C0000-0x000002352F9DE000-memory.dmp
              Filesize

              120KB

            • memory/4776-328-0x000002352F9E0000-0x000002352F9EB000-memory.dmp
              Filesize

              44KB

            • memory/4776-321-0x0000023530A50000-0x0000023530C44000-memory.dmp
              Filesize

              2.0MB

            • memory/4776-319-0x00000235140A0000-0x0000023514F88000-memory.dmp
              Filesize

              14.9MB