Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 19:30
Behavioral task
behavioral1
Sample
Microsoft Network Realtime inspection.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Microsoft Network Realtime inspection.exe
Resource
win10v2004-20240508-en
General
-
Target
Microsoft Network Realtime inspection.exe
-
Size
79KB
-
MD5
5c888eddae30076bd7aaa2e5d5fea097
-
SHA1
6a5b5c290d24bcd984a7083f934dbf35f56ec888
-
SHA256
267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788
-
SHA512
4a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1
-
SSDEEP
1536:y8p4oJOu7J3c+Fj4zo+ib+8qn36NOuCYh0uxqau:y5oJLJM5zJib+sOeh0uVu
Malware Config
Extracted
xworm
listing-trackbacks.gl.at.ply.gg:15337
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000EA0000-0x0000000000EBA000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\TLauncher family_xworm behavioral1/memory/1492-46-0x0000000000120000-0x000000000013A000-memory.dmp family_xworm behavioral1/memory/596-57-0x00000000012D0000-0x00000000012EA000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2680 powershell.exe 2756 powershell.exe 1952 powershell.exe 2080 powershell.exe -
Drops startup file 2 IoCs
Processes:
Microsoft Network Realtime inspection.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TLauncher.lnk Microsoft Network Realtime inspection.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TLauncher.lnk Microsoft Network Realtime inspection.exe -
Executes dropped EXE 6 IoCs
Processes:
csucrw.exeTLauncherxazwrm.EXETLauncherzdjser.exepccwxk.exepid process 2484 csucrw.exe 1492 TLauncher 1796 xazwrm.EXE 596 TLauncher 840 zdjser.exe 1096 pccwxk.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
csucrw.exeMicrosoft Network Realtime inspection.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\toad.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\toad.exe" csucrw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\TLauncher = "C:\\Users\\Admin\\AppData\\Roaming\\TLauncher" Microsoft Network Realtime inspection.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
pccwxk.exedescription ioc process File opened (read-only) \??\D: pccwxk.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeMicrosoft Network Realtime inspection.exepid process 2680 powershell.exe 2756 powershell.exe 1952 powershell.exe 2080 powershell.exe 2360 Microsoft Network Realtime inspection.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
Microsoft Network Realtime inspection.exepowershell.exepowershell.exepowershell.exepowershell.exeTLauncherTLauncherAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2360 Microsoft Network Realtime inspection.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 2360 Microsoft Network Realtime inspection.exe Token: SeDebugPrivilege 1492 TLauncher Token: SeDebugPrivilege 596 TLauncher Token: 33 1656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1656 AUDIODG.EXE Token: 33 1656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1656 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
csucrw.exepid process 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
csucrw.exepid process 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe 2484 csucrw.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Microsoft Network Realtime inspection.execsucrw.exezdjser.exepccwxk.exepid process 2360 Microsoft Network Realtime inspection.exe 2484 csucrw.exe 2484 csucrw.exe 840 zdjser.exe 1096 pccwxk.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
Microsoft Network Realtime inspection.exetaskeng.exedescription pid process target process PID 2360 wrote to memory of 2680 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2680 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2680 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2756 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2756 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2756 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 1952 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 1952 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 1952 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2080 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2080 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2080 2360 Microsoft Network Realtime inspection.exe powershell.exe PID 2360 wrote to memory of 2964 2360 Microsoft Network Realtime inspection.exe schtasks.exe PID 2360 wrote to memory of 2964 2360 Microsoft Network Realtime inspection.exe schtasks.exe PID 2360 wrote to memory of 2964 2360 Microsoft Network Realtime inspection.exe schtasks.exe PID 2360 wrote to memory of 2484 2360 Microsoft Network Realtime inspection.exe csucrw.exe PID 2360 wrote to memory of 2484 2360 Microsoft Network Realtime inspection.exe csucrw.exe PID 2360 wrote to memory of 2484 2360 Microsoft Network Realtime inspection.exe csucrw.exe PID 2360 wrote to memory of 2484 2360 Microsoft Network Realtime inspection.exe csucrw.exe PID 1988 wrote to memory of 1492 1988 taskeng.exe TLauncher PID 1988 wrote to memory of 1492 1988 taskeng.exe TLauncher PID 1988 wrote to memory of 1492 1988 taskeng.exe TLauncher PID 2360 wrote to memory of 1796 2360 Microsoft Network Realtime inspection.exe xazwrm.EXE PID 2360 wrote to memory of 1796 2360 Microsoft Network Realtime inspection.exe xazwrm.EXE PID 2360 wrote to memory of 1796 2360 Microsoft Network Realtime inspection.exe xazwrm.EXE PID 2360 wrote to memory of 1796 2360 Microsoft Network Realtime inspection.exe xazwrm.EXE PID 1988 wrote to memory of 596 1988 taskeng.exe TLauncher PID 1988 wrote to memory of 596 1988 taskeng.exe TLauncher PID 1988 wrote to memory of 596 1988 taskeng.exe TLauncher PID 2360 wrote to memory of 840 2360 Microsoft Network Realtime inspection.exe zdjser.exe PID 2360 wrote to memory of 840 2360 Microsoft Network Realtime inspection.exe zdjser.exe PID 2360 wrote to memory of 840 2360 Microsoft Network Realtime inspection.exe zdjser.exe PID 2360 wrote to memory of 840 2360 Microsoft Network Realtime inspection.exe zdjser.exe PID 2360 wrote to memory of 1096 2360 Microsoft Network Realtime inspection.exe pccwxk.exe PID 2360 wrote to memory of 1096 2360 Microsoft Network Realtime inspection.exe pccwxk.exe PID 2360 wrote to memory of 1096 2360 Microsoft Network Realtime inspection.exe pccwxk.exe PID 2360 wrote to memory of 1096 2360 Microsoft Network Realtime inspection.exe pccwxk.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Network Realtime inspection.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\TLauncher'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'TLauncher'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "TLauncher" /tr "C:\Users\Admin\AppData\Roaming\TLauncher"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csucrw.exe"C:\Users\Admin\AppData\Local\Temp\csucrw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\xazwrm.EXE"C:\Users\Admin\AppData\Local\Temp\xazwrm.EXE"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\zdjser.exe"C:\Users\Admin\AppData\Local\Temp\zdjser.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\pccwxk.exe"C:\Users\Admin\AppData\Local\Temp\pccwxk.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {84E4AEB6-BA2D-4323-83E1-8B4CBA5E29E7} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\TLauncherC:\Users\Admin\AppData\Roaming\TLauncher2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\TLauncherC:\Users\Admin\AppData\Roaming\TLauncher2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csucrw.exeFilesize
56KB
MD56d10f6618182a146fc3b407f8b0c080e
SHA1f7f6c854b5a5eb0debcc5060453d0d15d66eeb87
SHA256170c9351717e67cda6f3cfa73196c32462e63c87a07336821668b38bd0e1cf01
SHA51214ad694b297090cacf1aeb92badbba68d4ebb1b44da4a9e63137c0aa1ebc3a94236792266783f79b3428e3d611afe46288b9ae818c194fe1deb2fa9ea58febb5
-
C:\Users\Admin\AppData\Local\Temp\pccwxk.exeFilesize
20KB
MD5509327ac1ea4c69e4b90489f2902d940
SHA1a8a1da6767652a3dced9f53ade92f5d179226e24
SHA2563d40e9cae263cedef7c3ae6b75a0d87deeb62288513355ff4a441d5e346d456d
SHA5125a90739cf38838546a70f12ba44b0c1da3479d5aef68ec206bc9bb9665bbe86a74e92a36b1553493d3eda21ca2311e0e7c90b90074f5af580b9129134b0d525a
-
C:\Users\Admin\AppData\Local\Temp\xazwrm.EXEFilesize
32KB
MD50e89a28bcf39b8ffd68b55117aa2c8c0
SHA1f66ccc5892a386208fb3c105ed4b34e7e817cc51
SHA2565ed6b1884460c35b8d585fe11bcf8eb156180d7e30bc22182409b251dd02f1c3
SHA512a249eca07cea3180b8d0928659f2178163f03ef3b839f7482b3a26cf746e847fb1ae9b12e3b67071ab8e87fa58401e3d4395bcb58a7ca467cfbe38afd96b4054
-
C:\Users\Admin\AppData\Local\Temp\zdjser.exeFilesize
20KB
MD519796e0d82a76be6dafa5cb7b80e2506
SHA1ce7d0842683febfbc4e52278a25f75e29ccf6155
SHA25665d4c633bf347ed4766dbb6e003776a017ccb632d73c6138c3e880a94c114c2d
SHA512049111891524683fd63036355f02006ca1fd69478aa9597050f1bbeda256b25ce9f28684df80d169d50dcc01a8cbdb17e78b82ea4d49d71b9ee72588bd1e6fbb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD51d8483f6e0dae7e8b4e5f39b5c294546
SHA1068432217005fdb366c933352cb5f8f02729bc86
SHA256281058ba9868b937b86f095de84a7784cd1eae3dab7cd598faa2703037703e9f
SHA512b4c5ccb56784bad1f1da2a67c2713301c46a1fe1b228abbca565ed44234e6283abc6629f084b3a35045a89f5318d980009caabb492a3acd07624ce750eb1594d
-
C:\Users\Admin\AppData\Roaming\TLauncherFilesize
79KB
MD55c888eddae30076bd7aaa2e5d5fea097
SHA16a5b5c290d24bcd984a7083f934dbf35f56ec888
SHA256267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788
SHA5124a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/596-57-0x00000000012D0000-0x00000000012EA000-memory.dmpFilesize
104KB
-
memory/1492-46-0x0000000000120000-0x000000000013A000-memory.dmpFilesize
104KB
-
memory/1796-55-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2360-31-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmpFilesize
4KB
-
memory/2360-33-0x000007FEF5F80000-0x000007FEF696C000-memory.dmpFilesize
9.9MB
-
memory/2360-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmpFilesize
4KB
-
memory/2360-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmpFilesize
9.9MB
-
memory/2360-1-0x0000000000EA0000-0x0000000000EBA000-memory.dmpFilesize
104KB
-
memory/2680-9-0x00000000027E0000-0x00000000027E8000-memory.dmpFilesize
32KB
-
memory/2680-8-0x000000001B5E0000-0x000000001B8C2000-memory.dmpFilesize
2.9MB
-
memory/2680-7-0x0000000002950000-0x00000000029D0000-memory.dmpFilesize
512KB
-
memory/2756-16-0x00000000022D0000-0x00000000022D8000-memory.dmpFilesize
32KB
-
memory/2756-15-0x000000001B4F0000-0x000000001B7D2000-memory.dmpFilesize
2.9MB