Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 19:30

General

  • Target

    Microsoft Network Realtime inspection.exe

  • Size

    79KB

  • MD5

    5c888eddae30076bd7aaa2e5d5fea097

  • SHA1

    6a5b5c290d24bcd984a7083f934dbf35f56ec888

  • SHA256

    267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788

  • SHA512

    4a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1

  • SSDEEP

    1536:y8p4oJOu7J3c+Fj4zo+ib+8qn36NOuCYh0uxqau:y5oJLJM5zJib+sOeh0uVu

Malware Config

Extracted

Family

xworm

C2

listing-trackbacks.gl.at.ply.gg:15337

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe
    "C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft Network Realtime inspection.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Network Realtime inspection.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\TLauncher'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1952
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'TLauncher'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2080
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "TLauncher" /tr "C:\Users\Admin\AppData\Roaming\TLauncher"
      2⤵
      • Creates scheduled task(s)
      PID:2964
    • C:\Users\Admin\AppData\Local\Temp\csucrw.exe
      "C:\Users\Admin\AppData\Local\Temp\csucrw.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2484
    • C:\Users\Admin\AppData\Local\Temp\xazwrm.EXE
      "C:\Users\Admin\AppData\Local\Temp\xazwrm.EXE"
      2⤵
      • Executes dropped EXE
      PID:1796
    • C:\Users\Admin\AppData\Local\Temp\zdjser.exe
      "C:\Users\Admin\AppData\Local\Temp\zdjser.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:840
    • C:\Users\Admin\AppData\Local\Temp\pccwxk.exe
      "C:\Users\Admin\AppData\Local\Temp\pccwxk.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of SetWindowsHookEx
      PID:1096
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {84E4AEB6-BA2D-4323-83E1-8B4CBA5E29E7} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Roaming\TLauncher
      C:\Users\Admin\AppData\Roaming\TLauncher
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1492
    • C:\Users\Admin\AppData\Roaming\TLauncher
      C:\Users\Admin\AppData\Roaming\TLauncher
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:596
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x550
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\csucrw.exe
    Filesize

    56KB

    MD5

    6d10f6618182a146fc3b407f8b0c080e

    SHA1

    f7f6c854b5a5eb0debcc5060453d0d15d66eeb87

    SHA256

    170c9351717e67cda6f3cfa73196c32462e63c87a07336821668b38bd0e1cf01

    SHA512

    14ad694b297090cacf1aeb92badbba68d4ebb1b44da4a9e63137c0aa1ebc3a94236792266783f79b3428e3d611afe46288b9ae818c194fe1deb2fa9ea58febb5

  • C:\Users\Admin\AppData\Local\Temp\pccwxk.exe
    Filesize

    20KB

    MD5

    509327ac1ea4c69e4b90489f2902d940

    SHA1

    a8a1da6767652a3dced9f53ade92f5d179226e24

    SHA256

    3d40e9cae263cedef7c3ae6b75a0d87deeb62288513355ff4a441d5e346d456d

    SHA512

    5a90739cf38838546a70f12ba44b0c1da3479d5aef68ec206bc9bb9665bbe86a74e92a36b1553493d3eda21ca2311e0e7c90b90074f5af580b9129134b0d525a

  • C:\Users\Admin\AppData\Local\Temp\xazwrm.EXE
    Filesize

    32KB

    MD5

    0e89a28bcf39b8ffd68b55117aa2c8c0

    SHA1

    f66ccc5892a386208fb3c105ed4b34e7e817cc51

    SHA256

    5ed6b1884460c35b8d585fe11bcf8eb156180d7e30bc22182409b251dd02f1c3

    SHA512

    a249eca07cea3180b8d0928659f2178163f03ef3b839f7482b3a26cf746e847fb1ae9b12e3b67071ab8e87fa58401e3d4395bcb58a7ca467cfbe38afd96b4054

  • C:\Users\Admin\AppData\Local\Temp\zdjser.exe
    Filesize

    20KB

    MD5

    19796e0d82a76be6dafa5cb7b80e2506

    SHA1

    ce7d0842683febfbc4e52278a25f75e29ccf6155

    SHA256

    65d4c633bf347ed4766dbb6e003776a017ccb632d73c6138c3e880a94c114c2d

    SHA512

    049111891524683fd63036355f02006ca1fd69478aa9597050f1bbeda256b25ce9f28684df80d169d50dcc01a8cbdb17e78b82ea4d49d71b9ee72588bd1e6fbb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    1d8483f6e0dae7e8b4e5f39b5c294546

    SHA1

    068432217005fdb366c933352cb5f8f02729bc86

    SHA256

    281058ba9868b937b86f095de84a7784cd1eae3dab7cd598faa2703037703e9f

    SHA512

    b4c5ccb56784bad1f1da2a67c2713301c46a1fe1b228abbca565ed44234e6283abc6629f084b3a35045a89f5318d980009caabb492a3acd07624ce750eb1594d

  • C:\Users\Admin\AppData\Roaming\TLauncher
    Filesize

    79KB

    MD5

    5c888eddae30076bd7aaa2e5d5fea097

    SHA1

    6a5b5c290d24bcd984a7083f934dbf35f56ec888

    SHA256

    267d1802344caba41d174d5e9750695c446724e6c480bee1b79100a64931e788

    SHA512

    4a17d517772d0efff6fea2074af232c90f47b370fa9269d36970bec3a8204e1e3df8f273f21287f712d26117a803b428ffd3683581b85498515e1d908c5b3dd1

  • \??\PIPE\srvsvc
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • memory/596-57-0x00000000012D0000-0x00000000012EA000-memory.dmp
    Filesize

    104KB

  • memory/1492-46-0x0000000000120000-0x000000000013A000-memory.dmp
    Filesize

    104KB

  • memory/1796-55-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/2360-31-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp
    Filesize

    4KB

  • memory/2360-33-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp
    Filesize

    9.9MB

  • memory/2360-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp
    Filesize

    4KB

  • memory/2360-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp
    Filesize

    9.9MB

  • memory/2360-1-0x0000000000EA0000-0x0000000000EBA000-memory.dmp
    Filesize

    104KB

  • memory/2680-9-0x00000000027E0000-0x00000000027E8000-memory.dmp
    Filesize

    32KB

  • memory/2680-8-0x000000001B5E0000-0x000000001B8C2000-memory.dmp
    Filesize

    2.9MB

  • memory/2680-7-0x0000000002950000-0x00000000029D0000-memory.dmp
    Filesize

    512KB

  • memory/2756-16-0x00000000022D0000-0x00000000022D8000-memory.dmp
    Filesize

    32KB

  • memory/2756-15-0x000000001B4F0000-0x000000001B7D2000-memory.dmp
    Filesize

    2.9MB