Malware Analysis Report

2024-09-11 13:45

Sample ID 240614-glht5a1dqq
Target workpls.exe
SHA256 15b874bf48138911f8e51bcd50b8fbfbb92b2195e841e8f019ec0a4bf43d0b3c
Tags
xworm execution persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

15b874bf48138911f8e51bcd50b8fbfbb92b2195e841e8f019ec0a4bf43d0b3c

Threat Level: Known bad

The file workpls.exe was found to be: Known bad.

Malicious Activity Summary

xworm execution persistence rat trojan

Xworm

Xworm family

Detect Xworm Payload

Command and Scripting Interpreter: PowerShell

Drops startup file

Checks computer location settings

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 05:53

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm family

xworm

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 05:53

Reported

2024-06-14 05:56

Platform

win10v2004-20240508-en

Max time kernel

146s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\workpls.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm

trojan rat xworm

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\workpls.exe

"C:\Users\Admin\AppData\Local\Temp\workpls.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\workpls.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'workpls.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp

Files

memory/1328-0-0x00007FFE31143000-0x00007FFE31145000-memory.dmp

memory/1328-1-0x0000000000970000-0x000000000098A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h3ovoc1o.0im.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3624-2-0x00000167E9110000-0x00000167E9132000-memory.dmp

memory/3624-12-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

memory/3624-13-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

memory/3624-14-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

memory/3624-15-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

memory/3624-18-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 6d42b6da621e8df5674e26b799c8e2aa
SHA1 ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA256 5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA512 53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d65ebc84c6b0b52901fb46f5e2b83ab5
SHA1 d036a0c3eb9e1616d0f7f5ca41171060c13a3095
SHA256 d45581b0807a0d04a70ec75e3e4575e73f148e5b4e0d3d325dfbd6400a4bfbd1
SHA512 88ac232e7702ebd53788cf8429d266ae367111bfccf4bc9d40ead25b552347521458ca60d320e2775b5d2edcaf8501251cb2db68b38dc000ac50463fb80865be

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 2bb005f08e40b9d8c31f1c09da44565d
SHA1 8a7097ecaeca704b6d653bfedea449cfbe79072f
SHA256 d7c96f73a5074bd88297839f5e749996eb91510490acd18d16edd5751f087943
SHA512 3da328cd8050288fcd5e9545812f5b0767aa9c19674d6f6f5dc35e92d436b2690056018910ff5a90f33c1f6d9602c70a256637d52498f1794efc8617fea6cbe3

memory/1328-57-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

memory/1328-58-0x00007FFE31140000-0x00007FFE31C01000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 05:53

Reported

2024-06-14 05:56

Platform

win7-20240221-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\workpls.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm

trojan rat xworm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2164 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2552 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2552 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2552 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2064 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2064 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 2064 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2164 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\system32\cmd.exe
PID 2164 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\system32\cmd.exe
PID 2164 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\workpls.exe C:\Windows\system32\cmd.exe
PID 1800 wrote to memory of 780 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1800 wrote to memory of 780 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1800 wrote to memory of 780 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\workpls.exe

"C:\Users\Admin\AppData\Local\Temp\workpls.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\workpls.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'workpls.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6603.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

Network

Country Destination Domain Proto
US 8.8.8.8:53 pastebin.com udp
US 172.67.19.24:443 pastebin.com tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp
US 147.185.221.18:18043 tcp

Files

memory/2164-0-0x000007FEF5F23000-0x000007FEF5F24000-memory.dmp

memory/2164-1-0x0000000000A00000-0x0000000000A1A000-memory.dmp

memory/1296-6-0x0000000002B30000-0x0000000002BB0000-memory.dmp

memory/1296-7-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

memory/1296-8-0x0000000001F00000-0x0000000001F08000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 ecbeb1e4da19783e92eb6c4051a82a6d
SHA1 988ec64c0fd30e68b31f893280f2969d8bb56dfe
SHA256 861f6efbf65d1ee2821ffc44a2d279321bc78bcec7a8a05126bd3a926837e541
SHA512 c8f0a7661c21098c09a44424277feab77faeb161d1de8e2210a3bbc0b5d68b787aa9dd61cb80b226187ae164e06d20a9f95a8ee2a56db4743e47914f6972bf5d

memory/2152-14-0x000000001B440000-0x000000001B722000-memory.dmp

memory/2152-15-0x00000000023C0000-0x00000000023C8000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2164-32-0x000000001B3E0000-0x000000001B460000-memory.dmp

memory/2164-33-0x000007FEF5F23000-0x000007FEF5F24000-memory.dmp

memory/2164-34-0x000000001B3E0000-0x000000001B460000-memory.dmp

memory/2164-36-0x0000000000560000-0x000000000056C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp6603.tmp.bat

MD5 fc0988492a8b9efbeea957df7e877902
SHA1 597e36a40f5b00eadafd9cdb7db508ecea11f8d7
SHA256 7032aea8291374913e99e46b97de56107de6952b7b7414de5c31d1bda0dadc43
SHA512 4eac4e9944fe2377628a1ae3e2c5706cdc19db2e3d68a3fb889cdfeed227a1517866febcec18e3916716a0a86e8b3be8a1b155502223098b179f4e882c0cd822