Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 19:24
Behavioral task
behavioral1
Sample
Microsoft Network Realtime inspection.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Microsoft Network Realtime inspection.exe
Resource
win10v2004-20240508-en
General
-
Target
Microsoft Network Realtime inspection.exe
-
Size
79KB
-
MD5
5c888eddae30076bd7aaa2e5d5fea097
-
SHA1
6a5b5c290d24bcd984a7083f934dbf35f56ec888
-
SHA256
267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788
-
SHA512
4a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1
-
SSDEEP
1536:y8p4oJOu7J3c+Fj4zo+ib+8qn36NOuCYh0uxqau:y5oJLJM5zJib+sOeh0uVu
Malware Config
Extracted
xworm
listing-trackbacks.gl.at.ply.gg:15337
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1732-1-0x0000000000EC0000-0x0000000000EDA000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\TLauncher family_xworm behavioral1/memory/1924-35-0x00000000002B0000-0x00000000002CA000-memory.dmp family_xworm behavioral1/memory/1768-38-0x0000000000900000-0x000000000091A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2688 powershell.exe 1992 powershell.exe 2620 powershell.exe 2924 powershell.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 324 cmd.exe -
Drops startup file 2 IoCs
Processes:
Microsoft Network Realtime inspection.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TLauncher.lnk Microsoft Network Realtime inspection.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TLauncher.lnk Microsoft Network Realtime inspection.exe -
Executes dropped EXE 2 IoCs
Processes:
TLauncherTLauncherpid process 1924 TLauncher 1768 TLauncher -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Microsoft Network Realtime inspection.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\TLauncher = "C:\\Users\\Admin\\AppData\\Roaming\\TLauncher" Microsoft Network Realtime inspection.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2236 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeMicrosoft Network Realtime inspection.exepid process 2688 powershell.exe 1992 powershell.exe 2620 powershell.exe 2924 powershell.exe 1732 Microsoft Network Realtime inspection.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Microsoft Network Realtime inspection.exepowershell.exepowershell.exepowershell.exepowershell.exeTLauncherTLauncherdescription pid process Token: SeDebugPrivilege 1732 Microsoft Network Realtime inspection.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 1732 Microsoft Network Realtime inspection.exe Token: SeDebugPrivilege 1924 TLauncher Token: SeDebugPrivilege 1768 TLauncher -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Microsoft Network Realtime inspection.exepid process 1732 Microsoft Network Realtime inspection.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
Microsoft Network Realtime inspection.exetaskeng.execmd.exedescription pid process target process PID 1732 wrote to memory of 2688 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2688 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2688 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 1992 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 1992 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 1992 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2620 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2620 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2620 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2924 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2924 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2924 1732 Microsoft Network Realtime inspection.exe powershell.exe PID 1732 wrote to memory of 2704 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1732 wrote to memory of 2704 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1732 wrote to memory of 2704 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1812 wrote to memory of 1924 1812 taskeng.exe TLauncher PID 1812 wrote to memory of 1924 1812 taskeng.exe TLauncher PID 1812 wrote to memory of 1924 1812 taskeng.exe TLauncher PID 1812 wrote to memory of 1768 1812 taskeng.exe TLauncher PID 1812 wrote to memory of 1768 1812 taskeng.exe TLauncher PID 1812 wrote to memory of 1768 1812 taskeng.exe TLauncher PID 1732 wrote to memory of 2088 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1732 wrote to memory of 2088 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1732 wrote to memory of 2088 1732 Microsoft Network Realtime inspection.exe schtasks.exe PID 1732 wrote to memory of 324 1732 Microsoft Network Realtime inspection.exe cmd.exe PID 1732 wrote to memory of 324 1732 Microsoft Network Realtime inspection.exe cmd.exe PID 1732 wrote to memory of 324 1732 Microsoft Network Realtime inspection.exe cmd.exe PID 324 wrote to memory of 2236 324 cmd.exe timeout.exe PID 324 wrote to memory of 2236 324 cmd.exe timeout.exe PID 324 wrote to memory of 2236 324 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Network Realtime inspection.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\TLauncher'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'TLauncher'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "TLauncher" /tr "C:\Users\Admin\AppData\Roaming\TLauncher"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "TLauncher"2⤵
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB9DD.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\taskeng.exetaskeng.exe {822891B7-F6C7-44E3-8295-A785748D804D} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\TLauncherC:\Users\Admin\AppData\Roaming\TLauncher2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\TLauncherC:\Users\Admin\AppData\Roaming\TLauncher2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB9DD.tmp.batFilesize
189B
MD54d1c5c1d6a78553844e835e1705b9c5c
SHA1befe85ad4033405a23b60f99dd5f5e28ef45a6f1
SHA256de340a3f63cf3586cff5b6710f428f0ccdbd95fe1060a1b2a411f1b685e6ddc2
SHA51262ce72ff76248fbfc125c6ba57bb9c23aa393a388e9c78df61a44dc4409aa94b67407ba9db9a723ff146e1847888024c965bcb97fc6dcea00764847707f7394e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD567c8b66e269034e56458c07aa9d2efff
SHA1048405c4596b452ff1cdeaf0d9b2839cc351f0bb
SHA256e50efaadf48ab4a2d17d2f6ded07eabbcef5f5f472dffcbc5a9cf35c3739e560
SHA51212c4acaf1062cd8bd08cfda1f91c1baf8732321d84a604b16dbecd53752bc3f595791603ce1e7580a8576fc0c1a19d18004590f4ae6f3f5392d56d7606f42f39
-
C:\Users\Admin\AppData\Roaming\TLauncherFilesize
79KB
MD55c888eddae30076bd7aaa2e5d5fea097
SHA16a5b5c290d24bcd984a7083f934dbf35f56ec888
SHA256267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788
SHA5124a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1
-
memory/1732-1-0x0000000000EC0000-0x0000000000EDA000-memory.dmpFilesize
104KB
-
memory/1732-2-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmpFilesize
9.9MB
-
memory/1732-49-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmpFilesize
9.9MB
-
memory/1732-0-0x000007FEF50D3000-0x000007FEF50D4000-memory.dmpFilesize
4KB
-
memory/1732-30-0x000007FEF50D3000-0x000007FEF50D4000-memory.dmpFilesize
4KB
-
memory/1732-31-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmpFilesize
9.9MB
-
memory/1768-38-0x0000000000900000-0x000000000091A000-memory.dmpFilesize
104KB
-
memory/1924-35-0x00000000002B0000-0x00000000002CA000-memory.dmpFilesize
104KB
-
memory/1992-16-0x0000000001EF0000-0x0000000001EF8000-memory.dmpFilesize
32KB
-
memory/1992-15-0x000000001B610000-0x000000001B8F2000-memory.dmpFilesize
2.9MB
-
memory/2688-9-0x0000000001E00000-0x0000000001E08000-memory.dmpFilesize
32KB
-
memory/2688-8-0x000000001B800000-0x000000001BAE2000-memory.dmpFilesize
2.9MB
-
memory/2688-7-0x0000000002C80000-0x0000000002D00000-memory.dmpFilesize
512KB