Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 21:00
Behavioral task
behavioral1
Sample
2 лдшуте.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2 лдшуте.exe
Resource
win10v2004-20240226-en
General
-
Target
2 лдшуте.exe
-
Size
77KB
-
MD5
632ab73920e2e8e8100d927ab00e12a5
-
SHA1
4676f206bb580f87589bb2e1cfa0270959534ae6
-
SHA256
a4ee1f41eada056a3c1802839d549de40fdbd7995a5940a8f7cb9fb9785b0e87
-
SHA512
21df86d3316712979b995844516bb12f86823cb96977e52c05b9b855aece6c9917ffee31d5ba4d415babc8290fa2a364ba3cb501b5724208676d077469a829db
-
SSDEEP
1536:Lo34pW06sYLtjyzCLfvbpdyqD546KMhb/ujSOHSNdEn:YrTo0vbpY85ca/CSOHS4n
Malware Config
Extracted
xworm
word-belize.gl.at.ply.gg:1678
-
Install_directory
%AppData%
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2684-1-0x00000000010A0000-0x00000000010BA000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\system family_xworm behavioral1/memory/1228-33-0x0000000000E50000-0x0000000000E6A000-memory.dmp family_xworm behavioral1/memory/2196-38-0x0000000000080000-0x000000000009A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2528 powershell.exe 2548 powershell.exe 2392 powershell.exe 2800 powershell.exe -
Drops startup file 2 IoCs
Processes:
2 лдшуте.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.lnk 2 лдшуте.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.lnk 2 лдшуте.exe -
Executes dropped EXE 3 IoCs
Processes:
systemsystemsystempid process 1228 system 2928 system 2196 system -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2 лдшуте.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Roaming\\system" 2 лдшуте.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe2 лдшуте.exepid process 2528 powershell.exe 2548 powershell.exe 2392 powershell.exe 2800 powershell.exe 2684 2 лдшуте.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
2 лдшуте.exepowershell.exepowershell.exepowershell.exepowershell.exesystemsystemsystemdescription pid process Token: SeDebugPrivilege 2684 2 лдшуте.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2684 2 лдшуте.exe Token: SeDebugPrivilege 1228 system Token: SeDebugPrivilege 2928 system Token: SeDebugPrivilege 2196 system -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
2 лдшуте.exepid process 2684 2 лдшуте.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
2 лдшуте.exetaskeng.exedescription pid process target process PID 2684 wrote to memory of 2528 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2528 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2528 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2548 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2548 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2548 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2392 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2392 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2392 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2800 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2800 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 2800 2684 2 лдшуте.exe powershell.exe PID 2684 wrote to memory of 936 2684 2 лдшуте.exe schtasks.exe PID 2684 wrote to memory of 936 2684 2 лдшуте.exe schtasks.exe PID 2684 wrote to memory of 936 2684 2 лдшуте.exe schtasks.exe PID 2804 wrote to memory of 1228 2804 taskeng.exe system PID 2804 wrote to memory of 1228 2804 taskeng.exe system PID 2804 wrote to memory of 1228 2804 taskeng.exe system PID 2804 wrote to memory of 2928 2804 taskeng.exe system PID 2804 wrote to memory of 2928 2804 taskeng.exe system PID 2804 wrote to memory of 2928 2804 taskeng.exe system PID 2804 wrote to memory of 2196 2804 taskeng.exe system PID 2804 wrote to memory of 2196 2804 taskeng.exe system PID 2804 wrote to memory of 2196 2804 taskeng.exe system -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2 лдшуте.exe"C:\Users\Admin\AppData\Local\Temp\2 лдшуте.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2 лдшуте.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '2 лдшуте.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\system'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system" /tr "C:\Users\Admin\AppData\Roaming\system"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {26402487-3F77-42E8-B845-1101BD5D0181} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\systemC:\Users\Admin\AppData\Roaming\system2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\systemC:\Users\Admin\AppData\Roaming\system2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\systemC:\Users\Admin\AppData\Roaming\system2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZYVOCEIJDTDNLY4N8D3L.tempFilesize
7KB
MD55473e95f5a3ac54c33ec0b81e729de29
SHA116f540afbe75f5aea9f7991aa00e1e84fe1e1c8e
SHA256139b0e7509c92b80c60d7680d55cb4165351c360a6bf257f4bbef9237f4e8123
SHA51290afb64651fc81eb458a8d424037296803fa88b7222ae0ae7ed6be10e3667bec37a2ff0d41d24f3785aa63caaf8538eca22fdd6d6b615d27a31a32faa00012dd
-
C:\Users\Admin\AppData\Roaming\systemFilesize
77KB
MD5632ab73920e2e8e8100d927ab00e12a5
SHA14676f206bb580f87589bb2e1cfa0270959534ae6
SHA256a4ee1f41eada056a3c1802839d549de40fdbd7995a5940a8f7cb9fb9785b0e87
SHA51221df86d3316712979b995844516bb12f86823cb96977e52c05b9b855aece6c9917ffee31d5ba4d415babc8290fa2a364ba3cb501b5724208676d077469a829db
-
memory/1228-33-0x0000000000E50000-0x0000000000E6A000-memory.dmpFilesize
104KB
-
memory/2196-38-0x0000000000080000-0x000000000009A000-memory.dmpFilesize
104KB
-
memory/2528-7-0x000000001B370000-0x000000001B652000-memory.dmpFilesize
2.9MB
-
memory/2528-8-0x0000000001EB0000-0x0000000001EB8000-memory.dmpFilesize
32KB
-
memory/2548-14-0x000000001B350000-0x000000001B632000-memory.dmpFilesize
2.9MB
-
memory/2548-15-0x0000000002010000-0x0000000002018000-memory.dmpFilesize
32KB
-
memory/2684-1-0x00000000010A0000-0x00000000010BA000-memory.dmpFilesize
104KB
-
memory/2684-2-0x000007FEF4E40000-0x000007FEF582C000-memory.dmpFilesize
9.9MB
-
memory/2684-29-0x000007FEF4E43000-0x000007FEF4E44000-memory.dmpFilesize
4KB
-
memory/2684-34-0x000007FEF4E40000-0x000007FEF582C000-memory.dmpFilesize
9.9MB
-
memory/2684-0-0x000007FEF4E43000-0x000007FEF4E44000-memory.dmpFilesize
4KB