Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 20:49
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20240226-en
General
-
Target
svchost.exe
-
Size
69KB
-
MD5
3d0f60a06bfead1b3ce9847dbd9ce7e7
-
SHA1
e79eff9033d46736a876ab3379038a592d8e210f
-
SHA256
e9dad4f37bdc3e80130637b3b5de29bf78e376cb8b8894a27ab4b727d60dff5b
-
SHA512
c0eb730f283df54c2f061da019b57879e29b8f5549309d71630fcb541be894d47eab3943d011363dd0a9bd93e07962411454d9e88e6f5d61a4e0babfde62fc08
-
SSDEEP
768:rOwHIR8aFGww4GZAAjGnlb0fl70xSm9WlYb03o46XeLmsR263Z8O71h80XZBSq:izR845VGaQoHdb03o46uN06OO71Roq
Malware Config
Extracted
xworm
inn-ht.gl.at.ply.gg:60031
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2164-1-0x0000000000380000-0x0000000000398000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\svchost.exe family_xworm behavioral1/memory/1248-36-0x0000000000310000-0x0000000000328000-memory.dmp family_xworm behavioral1/memory/2008-39-0x0000000000EA0000-0x0000000000EB8000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2720 powershell.exe 2456 powershell.exe 2752 powershell.exe 636 powershell.exe -
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 1248 svchost.exe 2008 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exesvchost.exepid process 2720 powershell.exe 2752 powershell.exe 2456 powershell.exe 636 powershell.exe 2164 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
svchost.exepowershell.exepowershell.exepowershell.exepowershell.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 2164 svchost.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 636 powershell.exe Token: SeDebugPrivilege 2164 svchost.exe Token: SeDebugPrivilege 1248 svchost.exe Token: SeDebugPrivilege 2008 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2164 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
svchost.exetaskeng.exedescription pid process target process PID 2164 wrote to memory of 2720 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2720 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2720 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2752 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2752 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2752 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2456 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2456 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2456 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 636 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 636 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 636 2164 svchost.exe powershell.exe PID 2164 wrote to memory of 2700 2164 svchost.exe schtasks.exe PID 2164 wrote to memory of 2700 2164 svchost.exe schtasks.exe PID 2164 wrote to memory of 2700 2164 svchost.exe schtasks.exe PID 2788 wrote to memory of 1248 2788 taskeng.exe svchost.exe PID 2788 wrote to memory of 1248 2788 taskeng.exe svchost.exe PID 2788 wrote to memory of 1248 2788 taskeng.exe svchost.exe PID 2788 wrote to memory of 2008 2788 taskeng.exe svchost.exe PID 2788 wrote to memory of 2008 2788 taskeng.exe svchost.exe PID 2788 wrote to memory of 2008 2788 taskeng.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {76CDC7B0-21ED-4103-8C65-BF2D481D77AE} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F72HULDSFQV6WHHAZ1NY.tempFilesize
7KB
MD5ca13b5d13c1e88f2b5bf42d9845a0d3b
SHA101f093f08828142c35f6d7f67da002f1afdf1d5d
SHA25688878380854077fed5e0f4bf0d0117f67e1066ad41a8333135ee3cc259de3ec2
SHA512b4ec2c950b3cbe3164e646bf7d022f76561464ba90ea6686c9e3e13059ea01b7e48d46a884dd6b8e31ef3f55b058c8f2cf8624e32cd835e13b96ef003ac4e675
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
69KB
MD53d0f60a06bfead1b3ce9847dbd9ce7e7
SHA1e79eff9033d46736a876ab3379038a592d8e210f
SHA256e9dad4f37bdc3e80130637b3b5de29bf78e376cb8b8894a27ab4b727d60dff5b
SHA512c0eb730f283df54c2f061da019b57879e29b8f5549309d71630fcb541be894d47eab3943d011363dd0a9bd93e07962411454d9e88e6f5d61a4e0babfde62fc08
-
memory/1248-36-0x0000000000310000-0x0000000000328000-memory.dmpFilesize
96KB
-
memory/2008-39-0x0000000000EA0000-0x0000000000EB8000-memory.dmpFilesize
96KB
-
memory/2164-31-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmpFilesize
4KB
-
memory/2164-0-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmpFilesize
4KB
-
memory/2164-32-0x000007FEF5C90000-0x000007FEF667C000-memory.dmpFilesize
9.9MB
-
memory/2164-2-0x000007FEF5C90000-0x000007FEF667C000-memory.dmpFilesize
9.9MB
-
memory/2164-1-0x0000000000380000-0x0000000000398000-memory.dmpFilesize
96KB
-
memory/2720-8-0x000000001B5B0000-0x000000001B892000-memory.dmpFilesize
2.9MB
-
memory/2720-9-0x0000000001F00000-0x0000000001F08000-memory.dmpFilesize
32KB
-
memory/2720-7-0x00000000028D0000-0x0000000002950000-memory.dmpFilesize
512KB
-
memory/2752-16-0x0000000002860000-0x0000000002868000-memory.dmpFilesize
32KB
-
memory/2752-15-0x000000001B680000-0x000000001B962000-memory.dmpFilesize
2.9MB