General
-
Target
Prism Release.rar
-
Size
5.0MB
-
Sample
240614-16dwfssapp
-
MD5
cf4175a87968d52a248920d0e535f99f
-
SHA1
d8643a03396a68b649bf91190f9abdaa4b0d8299
-
SHA256
44620d19260c789de580e65e07e1464a4abbbeccf1ddda2256b6b1a4ab6a82d1
-
SHA512
b5dc7093ae8eba11974965b901bdbe5fd059c308fb6f8d1649ec2929f3d909d8492862055e55a019c38b08600a99d85377c73581052f5f5a02f626d9a86f37bd
-
SSDEEP
98304:/cw4O8ABxHjBgsopAPUnV9BCJVI2ne5fKOksq5wE2UqgKS:UG8sxVgsUAsnVvye5yOGRF
Static task
static1
Behavioral task
behavioral1
Sample
Prism Release/ByfronHook.dll
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
Prism Release/Prism Release V1.6.exe
Resource
win11-20240611-en
Behavioral task
behavioral3
Sample
Prism Release/assets.dll
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
Prism Release/bin/autoattach.dll
Resource
win11-20240611-en
Malware Config
Extracted
xworm
91.92.241.69:5555
-
Install_directory
%ProgramData%
-
install_file
Windows Runtime.exe
Targets
-
-
Target
Prism Release/ByfronHook.dll
-
Size
21KB
-
MD5
4e3e92823caeac1203beaa5a35d6dafc
-
SHA1
893b591d46c39e817052cd05ec969fea74da4233
-
SHA256
3811858da4b1f5e7f40d1237d7189ddca3989fa0d7b07e87c538f92975b893d2
-
SHA512
0490e800f1e5c9b38b6c9b56616290f3a7214179e6d993214e3dd742d44d1d669fe5073b5a121c588c05f3e7c0ec576798236ee94e1a9b37e1d980d1969c9d33
-
SSDEEP
384:pPLl4JbDL8XQZW8LN/4pvuBUyHVz0Ad29DtSLKZR2CF/9+8ADu/TyZdEPLe:pPh4yQZW8LNuAUyJl29DtSLKZR2m9+8m
Score1/10 -
-
-
Target
Prism Release/Prism Release V1.6.exe
-
Size
5.1MB
-
MD5
29056c6bb64b495974bfff8fdfd126dd
-
SHA1
0e6e6cb010b35fc8e48b5b3664b85beb07c06e34
-
SHA256
cee9d4132e0c5f98b5d84099c9f4a080b35e436174be8e5a59df1e8c7cae8fbd
-
SHA512
c5afea872ba62ed246a54f71b351791109d294752f7c69eb58b867fce696b9c4ecd9f9481f28677dc6c2ea68ea2cacbb302ef8183aaa91dd2fee05a7d70b602a
-
SSDEEP
98304:Dg4vUzghgparV16jIdGpD9Ii62SYRieom2/QzJgfODDm/RM:c4vFSApojIdGphd62aXizfDe
-
Detect Xworm Payload
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
Prism Release/assets.dll
-
Size
171KB
-
MD5
bcc0b07de0a24f9701fc97d154ecd660
-
SHA1
cb5ba3b790cee940b4d18ff78e5a6cd71bdad47d
-
SHA256
672cb16128dea50e21fd2d98889e2d6a2264b654304a3f4248ebdf4c546f734a
-
SHA512
18959767986401bc877d30416e550c55e97c158f674b8f76dc9af117494e65e11d6000521f72be93c193ebd38f84d1b9578386c24911fda97507277f06ebd8e4
-
SSDEEP
3072:rN505WN505WN505WN505WN505WN505WN505WN505WN505m:rNJNJNJNJNJNJNJNJNB
Score1/10 -
-
-
Target
Prism Release/bin/autoattach.dll
-
Size
21KB
-
MD5
4e3e92823caeac1203beaa5a35d6dafc
-
SHA1
893b591d46c39e817052cd05ec969fea74da4233
-
SHA256
3811858da4b1f5e7f40d1237d7189ddca3989fa0d7b07e87c538f92975b893d2
-
SHA512
0490e800f1e5c9b38b6c9b56616290f3a7214179e6d993214e3dd742d44d1d669fe5073b5a121c588c05f3e7c0ec576798236ee94e1a9b37e1d980d1969c9d33
-
SSDEEP
384:pPLl4JbDL8XQZW8LN/4pvuBUyHVz0Ad29DtSLKZR2CF/9+8ADu/TyZdEPLe:pPh4yQZW8LNuAUyJl29DtSLKZR2m9+8m
Score1/10 -
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Scheduled Task/Job
1Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1