Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 05:25
Behavioral task
behavioral1
Sample
WizClient.exe
Resource
win10v2004-20240508-en
General
-
Target
WizClient.exe
-
Size
75KB
-
MD5
6e9da280e2aebeb8224a0d717ec0cade
-
SHA1
9899b0a07ee7d77058a6ea10d0175da91a7c108c
-
SHA256
99232a515ecf97e955c7670fc968197b580a4c9da436af31e3cea5f0455cef7d
-
SHA512
0c079f8f00a87830bd57b0a0484c9667b1c058baeb120ac3fd2b47cd0f46efd5af77b2c99ec49eed820239105c73d93eab13f70ce37684d4a72d777a0c8eb25c
-
SSDEEP
1536:naEEjYy8YeKyLqKiyrJHkkhubz4zFYG+yHP66TsgOldgtF:aEVHk2ubzLSsgOldQF
Malware Config
Extracted
xworm
programme-garden.gl.at.ply.gg:42957
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2396-1-0x0000000000490000-0x00000000004A8000-memory.dmp family_xworm C:\ProgramData\WizClient.exe family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepid process 5032 powershell.exe 980 powershell.exe 1124 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WizClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WizClient.exe -
Drops startup file 2 IoCs
Processes:
WizClient.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe -
Executes dropped EXE 1 IoCs
Processes:
WizClient.exepid process 2400 WizClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WizClient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WizClient = "C:\\ProgramData\\WizClient.exe" WizClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
powershell.exepowershell.exepowershell.exetaskmgr.exepid process 5032 powershell.exe 5032 powershell.exe 980 powershell.exe 980 powershell.exe 1124 powershell.exe 1124 powershell.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
WizClient.exepowershell.exepowershell.exepowershell.exetaskmgr.exeWizClient.exedescription pid process Token: SeDebugPrivilege 2396 WizClient.exe Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 2396 WizClient.exe Token: SeDebugPrivilege 3344 taskmgr.exe Token: SeSystemProfilePrivilege 3344 taskmgr.exe Token: SeCreateGlobalPrivilege 3344 taskmgr.exe Token: SeDebugPrivilege 2400 WizClient.exe Token: 33 3344 taskmgr.exe Token: SeIncBasePriorityPrivilege 3344 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WizClient.exedescription pid process target process PID 2396 wrote to memory of 5032 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 5032 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 980 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 980 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 1124 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 1124 2396 WizClient.exe powershell.exe PID 2396 wrote to memory of 1392 2396 WizClient.exe schtasks.exe PID 2396 wrote to memory of 1392 2396 WizClient.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WizClient.exe"C:\Users\Admin\AppData\Local\Temp\WizClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizClient" /tr "C:\ProgramData\WizClient.exe"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\ProgramData\WizClient.exeC:\ProgramData\WizClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WizClient.exeFilesize
75KB
MD56e9da280e2aebeb8224a0d717ec0cade
SHA19899b0a07ee7d77058a6ea10d0175da91a7c108c
SHA25699232a515ecf97e955c7670fc968197b580a4c9da436af31e3cea5f0455cef7d
SHA5120c079f8f00a87830bd57b0a0484c9667b1c058baeb120ac3fd2b47cd0f46efd5af77b2c99ec49eed820239105c73d93eab13f70ce37684d4a72d777a0c8eb25c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d0a40a2d16d62c60994d5bb5624a589b
SHA130f0a77f10518a09d83e6185d6c4cde23e4de8af
SHA256c213a4024e89a0240d0b1fa3b18ea3db3db7bbe7ca1bdeed86dce9c2c4991ef8
SHA512cecef5087f194a83948880e36445324406218f6877386d6db7850b8f97ac107e042ea9445bb7e73c6e6a2c7da9782b7dae8caba0a1c997677d096b3271a4cac0
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pqk4psbk.ey5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnkFilesize
682B
MD5b106cb54b75a53232b7d4b0f8697c7c6
SHA1b7fa69dc95c45ba6e867de8f0e8d2bb9ec6ce71b
SHA256aa4bd31f9762ee9b212d1fce00eb36d2ed75dd18dc3c99ba115f7c140c27e50e
SHA51221707cddb8ebff59255f7160cc385b5e515ae2586bff6450b644772a13909fbfdea201f7f2f06fdead57cd4111448ca00a457fd8701b66600c5e613d34f52688
-
memory/2396-1-0x0000000000490000-0x00000000004A8000-memory.dmpFilesize
96KB
-
memory/2396-2-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB
-
memory/2396-0-0x00007FF8010B3000-0x00007FF8010B5000-memory.dmpFilesize
8KB
-
memory/2396-51-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB
-
memory/2396-50-0x00007FF8010B3000-0x00007FF8010B5000-memory.dmpFilesize
8KB
-
memory/3344-64-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-61-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-58-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-59-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-52-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-53-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-54-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-60-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-63-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/3344-62-0x0000028F3CCE0000-0x0000028F3CCE1000-memory.dmpFilesize
4KB
-
memory/5032-18-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB
-
memory/5032-8-0x0000024BB5C30000-0x0000024BB5C52000-memory.dmpFilesize
136KB
-
memory/5032-14-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB
-
memory/5032-15-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB
-
memory/5032-13-0x00007FF8010B0000-0x00007FF801B71000-memory.dmpFilesize
10.8MB