Analysis Overview
SHA256
dc856fb70d4e39552a8138f2897ac67b4f62061c75118a8f009e1355cc93a923
Threat Level: Known bad
The file ultrahook_antiprocesscmd_bypass.exe was found to be: Known bad.
Malicious Activity Summary
Xworm
Detect Xworm Payload
Command and Scripting Interpreter: PowerShell
Executes dropped EXE
Drops startup file
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Checks SCSI registry key(s)
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-11 12:46
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 12:46
Reported
2024-06-11 12:49
Platform
win10-20240404-en
Max time kernel
144s
Max time network
138s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk | C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk | C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\rescache\_merged\4183903823\2290032291.pri | C:\Windows\system32\taskmgr.exe | N/A |
| File created | C:\Windows\rescache\_merged\1601268389\715946058.pri | C:\Windows\system32\taskmgr.exe | N/A |
Enumerates physical storage devices
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe
"C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ultrahook_antiprocesscmd_bypass.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ultrahook_antiprocesscmd_bypass.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Users\Admin\AppData\Roaming\svchost.exe
C:\Users\Admin\AppData\Roaming\svchost.exe
C:\Users\Admin\AppData\Roaming\svchost.exe
C:\Users\Admin\AppData\Roaming\svchost.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | 1.112.95.208.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | 235.3.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.125.102.39:16117 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 39.102.125.3.in-addr.arpa | udp |
Files
memory/4764-0-0x0000000000250000-0x00000000005FE000-memory.dmp
memory/4764-1-0x0000000073AFE000-0x0000000073AFF000-memory.dmp
memory/4764-2-0x0000000000250000-0x00000000005FE000-memory.dmp
memory/4764-3-0x00000000057D0000-0x000000000586C000-memory.dmp
memory/4764-4-0x0000000005730000-0x0000000005796000-memory.dmp
memory/4764-5-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-8-0x00000000043C0000-0x00000000043F6000-memory.dmp
memory/2000-9-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-10-0x0000000006E80000-0x00000000074A8000-memory.dmp
memory/2000-11-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-12-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-14-0x0000000006DD0000-0x0000000006E36000-memory.dmp
memory/2000-13-0x0000000006D30000-0x0000000006D52000-memory.dmp
memory/2000-15-0x0000000007800000-0x0000000007B50000-memory.dmp
memory/2000-16-0x0000000007640000-0x000000000765C000-memory.dmp
memory/2000-17-0x0000000007FF0000-0x000000000803B000-memory.dmp
memory/2000-18-0x0000000007EB0000-0x0000000007F26000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dfdmigiu.gjn.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
memory/2000-35-0x0000000008D50000-0x0000000008D83000-memory.dmp
memory/2000-36-0x000000006F4D0000-0x000000006F51B000-memory.dmp
memory/2000-38-0x0000000008D30000-0x0000000008D4E000-memory.dmp
memory/2000-37-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-43-0x00000000090A0000-0x0000000009145000-memory.dmp
memory/2000-44-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/2000-45-0x0000000009270000-0x0000000009304000-memory.dmp
memory/2000-238-0x0000000009220000-0x000000000923A000-memory.dmp
memory/2000-243-0x0000000009210000-0x0000000009218000-memory.dmp
memory/2000-259-0x0000000073AF0000-0x00000000741DE000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | db01a2c1c7e70b2b038edf8ad5ad9826 |
| SHA1 | 540217c647a73bad8d8a79e3a0f3998b5abd199b |
| SHA256 | 413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d |
| SHA512 | c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 77ebe6abc8a933a14562cfe545e55c4a |
| SHA1 | 018c73820bc56e3a7450c5da38a8b58b78060832 |
| SHA256 | d4ec58635f09fb9ca7610b7774754138d27b5e2b10ea6f515e8f27da779fe1bb |
| SHA512 | 5e9e924797b65f378e2165c9be7c255c4500fc4081b3f96e851d07c58da3f9254246f33da4d01846c928cf5aaf4cd23150038be1a10dd1741cc0b9d30902c573 |
memory/4344-281-0x000000006F4D0000-0x000000006F51B000-memory.dmp
memory/4824-498-0x0000000007A00000-0x0000000007D50000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 17d7b8ee2182cd5364c664528c4a875b |
| SHA1 | 1ebf57ad498526c5a874cca5ab2b1f796b811428 |
| SHA256 | b81dda42d0513945fe9dc8f11645b0426e2aedf3e50a63758356cce275ab5ede |
| SHA512 | 26010e3fa993333d4342de058d694a9578bc769fec37d8d422035560095df641619c2ee21413c47674457c35dfa7357a3f4cd4d2161bab303a079aed8f62a9ff |
memory/4824-516-0x000000006F4D0000-0x000000006F51B000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | be218be1c9610ae22269d7c2245885a9 |
| SHA1 | 8d551d1ec51aa4e0d6b3f95112185315ae74d2d9 |
| SHA256 | 1485f363b9f9426232134e7be44f2240c0670d6d3fd3ef9b0bf49164ab69e0cd |
| SHA512 | ab43912c3cb4c664f46d401389b16867add40f9e4792c4aff8082092df84002d65ae0c01a2c842b87643a7952afb0394e19e71aaa8d6c4eed5f7fc05f4358c48 |
memory/4764-746-0x0000000000250000-0x00000000005FE000-memory.dmp
memory/5068-751-0x000000006F4D0000-0x000000006F51B000-memory.dmp
memory/4764-975-0x0000000073AFE000-0x0000000073AFF000-memory.dmp
memory/4764-976-0x00000000070A0000-0x000000000759E000-memory.dmp
memory/4764-977-0x0000000006F50000-0x0000000006FE2000-memory.dmp
memory/4764-978-0x0000000006EF0000-0x0000000006EFA000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
| MD5 | dea8a0992c2ff0d8c3b37a19621e82ae |
| SHA1 | 6d43b1d02369ea4689e6af3219c6babc456d8663 |
| SHA256 | 42bf1581eaeb1e26d6c790f053f025cc4523d1d76bb3d4297dfcc13bee466970 |
| SHA512 | 40f754b88a33f2459aeab19b3bb842db396949e88348ce3fbe23c4f0471c434266273699e8559d4685b578854ed2c348ee6720b0e5a5390ad76b27a768af9155 |
C:\Users\Admin\AppData\Roaming\svchost.exe
| MD5 | 2e8d53246d80a360d9ef4b87197b6bd8 |
| SHA1 | 2f97d0c0a112f909899efc331db93a143a987977 |
| SHA256 | dc856fb70d4e39552a8138f2897ac67b4f62061c75118a8f009e1355cc93a923 |
| SHA512 | 3e7914fdff4d467f52a91996cbf047a6033c3eb5a7b605ad1f0ee18ea328f37de3bb911d1a4144aa05fb20375a39811ac93ddbe0fcfe42ddb4845bc002bcf2d5 |
memory/4764-982-0x0000000073AF0000-0x00000000741DE000-memory.dmp
memory/4208-989-0x0000000000190000-0x000000000053E000-memory.dmp
memory/4208-990-0x0000000000190000-0x000000000053E000-memory.dmp
memory/4208-991-0x0000000000190000-0x000000000053E000-memory.dmp
memory/4208-994-0x0000000000190000-0x000000000053E000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
| MD5 | 18b4b20964ba71871f587253160ae3b1 |
| SHA1 | b0670adc90ecec31186448446ed43fc188be4559 |
| SHA256 | cb7844efb0b5fa59684743fa546012600ffe6fcc3aeb6c243796c1b1d8978987 |
| SHA512 | 3fd458c517e43734477b209d38cd79f44f0b46de2c81386f83db99bd2f1fe27bff6594422c747d6b7eb32d24738d7257c94716c28a26205200958265d0cb5826 |
memory/2352-1001-0x0000000000190000-0x000000000053E000-memory.dmp
memory/2352-1003-0x0000000000190000-0x000000000053E000-memory.dmp
memory/2352-1006-0x0000000000190000-0x000000000053E000-memory.dmp