Analysis
-
max time kernel
58s -
max time network
62s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
Uvhnsfbxbdz.exe
Resource
win11-20240508-en
General
-
Target
Uvhnsfbxbdz.exe
-
Size
4.6MB
-
MD5
661f27fd0e4a64fa4c355653659b4f34
-
SHA1
2744908b35ff9581f2cbb37ce89e7f7510dee8a7
-
SHA256
d2a3936965e20932965c64a29ddb12d5d7ecd9a4fd2a074b374da3637881e520
-
SHA512
8941b4cd1f21e01acc25a4f3b8e3cfec7886eab0e4139f2311b306d9538ae7dbb22af800d2aa1232a8669fb149a854162b7ffa4c4278ebe5460d82d442b3fe1a
-
SSDEEP
24576:AKRkqPje4s2Dhi0ZL8aSl2awqGZ/Gss48JhE9hR2HN1dcPuWd+V54xOS/9Ml/JA3:Ay
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2504-4902-0x0000000000400000-0x0000000000434000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 1052 powershell.exe 2396 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Uvhnsfbxbdz.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\Docker \\.exe" Uvhnsfbxbdz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Uvhnsfbxbdz.exedescription pid process target process PID 1460 set thread context of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Uvhnsfbxbdz.exepowershell.exepowershell.exepid process 1460 Uvhnsfbxbdz.exe 2396 powershell.exe 2396 powershell.exe 1052 powershell.exe 1052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uvhnsfbxbdz.exeUvhnsfbxbdz.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1460 Uvhnsfbxbdz.exe Token: SeDebugPrivilege 1460 Uvhnsfbxbdz.exe Token: SeDebugPrivilege 2504 Uvhnsfbxbdz.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Uvhnsfbxbdz.exeUvhnsfbxbdz.exedescription pid process target process PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 1460 wrote to memory of 2504 1460 Uvhnsfbxbdz.exe Uvhnsfbxbdz.exe PID 2504 wrote to memory of 2396 2504 Uvhnsfbxbdz.exe powershell.exe PID 2504 wrote to memory of 2396 2504 Uvhnsfbxbdz.exe powershell.exe PID 2504 wrote to memory of 2396 2504 Uvhnsfbxbdz.exe powershell.exe PID 2504 wrote to memory of 1052 2504 Uvhnsfbxbdz.exe powershell.exe PID 2504 wrote to memory of 1052 2504 Uvhnsfbxbdz.exe powershell.exe PID 2504 wrote to memory of 1052 2504 Uvhnsfbxbdz.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uvhnsfbxbdz.exe"C:\Users\Admin\AppData\Local\Temp\Uvhnsfbxbdz.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Uvhnsfbxbdz.exe"C:\Users\Admin\AppData\Local\Temp\Uvhnsfbxbdz.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Uvhnsfbxbdz.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Uvhnsfbxbdz.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Uvhnsfbxbdz.exe.logFilesize
805B
MD59d0cacca373731660e8268a162d9d4ff
SHA1a82111d00132cdf7ef46af5681601d55c6a0e17c
SHA25695932f81206717ff86f0974ee37dc40d5d914f730f00a08344b4c1765d663394
SHA5128c971ab501fc322b13f53b03325b2295e1eedb12b6d50a4225e6e3b4bf5128665b1a3d8b560a8b04f14bfa6f5cba41058e4f546139101fc303f3b8393f5ca485
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD54d49e7265a5bdff46905394b45ec737e
SHA1e64e84795754c56e67baf4a364538018ff56bd3c
SHA256f4c9449a568a777fcc720ca14f2a0ebb79b40876177c214bfe15405600a1c3b3
SHA5125b4dd1f8da1756214d2ef33baa021f44628c1a1eaa7c68763b3dd6cec78528b88069b4d13027773e1af5f768620c7a341d823755a1f343dcad9ce11298b43d08
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iew2fpb3.gws.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1052-4958-0x000000006FFD0000-0x000000007001C000-memory.dmpFilesize
304KB
-
memory/1052-4956-0x0000000005E00000-0x0000000006157000-memory.dmpFilesize
3.3MB
-
memory/1460-4892-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/1460-58-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-5-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-20-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-16-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-46-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-54-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-56-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-68-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-66-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-64-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-62-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-60-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-53-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-50-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-48-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-44-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-42-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-38-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-36-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-34-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-4-0x0000000006C20000-0x0000000006CB2000-memory.dmpFilesize
584KB
-
memory/1460-32-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-40-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-30-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-28-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-26-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-24-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-14-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-12-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-10-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-8-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-6-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-4891-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/1460-22-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-4893-0x0000000006E60000-0x0000000006ECE000-memory.dmpFilesize
440KB
-
memory/1460-4895-0x00000000056D0000-0x0000000005724000-memory.dmpFilesize
336KB
-
memory/1460-4894-0x0000000006ED0000-0x0000000006F1C000-memory.dmpFilesize
304KB
-
memory/1460-18-0x0000000006950000-0x0000000006B7C000-memory.dmpFilesize
2.2MB
-
memory/1460-0-0x0000000074EAE000-0x0000000074EAF000-memory.dmpFilesize
4KB
-
memory/1460-1-0x0000000000800000-0x0000000000C92000-memory.dmpFilesize
4.6MB
-
memory/1460-2-0x0000000006950000-0x0000000006B82000-memory.dmpFilesize
2.2MB
-
memory/1460-3-0x0000000007130000-0x00000000076D6000-memory.dmpFilesize
5.6MB
-
memory/1460-4900-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2396-4934-0x0000000007650000-0x00000000076F4000-memory.dmpFilesize
656KB
-
memory/2396-4939-0x00000000079C0000-0x00000000079D1000-memory.dmpFilesize
68KB
-
memory/2396-4911-0x0000000005DE0000-0x0000000005E46000-memory.dmpFilesize
408KB
-
memory/2396-4909-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2396-4912-0x0000000005EC0000-0x0000000006217000-memory.dmpFilesize
3.3MB
-
memory/2396-4921-0x0000000006460000-0x000000000647E000-memory.dmpFilesize
120KB
-
memory/2396-4922-0x0000000006490000-0x00000000064DC000-memory.dmpFilesize
304KB
-
memory/2396-4923-0x0000000007410000-0x0000000007444000-memory.dmpFilesize
208KB
-
memory/2396-4924-0x000000006FFD0000-0x000000007001C000-memory.dmpFilesize
304KB
-
memory/2396-4933-0x0000000006A40000-0x0000000006A5E000-memory.dmpFilesize
120KB
-
memory/2396-4906-0x0000000004FD0000-0x0000000005006000-memory.dmpFilesize
216KB
-
memory/2396-4935-0x0000000007DF0000-0x000000000846A000-memory.dmpFilesize
6.5MB
-
memory/2396-4936-0x00000000077B0000-0x00000000077CA000-memory.dmpFilesize
104KB
-
memory/2396-4937-0x0000000007820000-0x000000000782A000-memory.dmpFilesize
40KB
-
memory/2396-4938-0x0000000007A50000-0x0000000007AE6000-memory.dmpFilesize
600KB
-
memory/2396-4910-0x00000000055C0000-0x00000000055E2000-memory.dmpFilesize
136KB
-
memory/2396-4940-0x00000000079F0000-0x00000000079FE000-memory.dmpFilesize
56KB
-
memory/2396-4941-0x0000000007A00000-0x0000000007A15000-memory.dmpFilesize
84KB
-
memory/2396-4942-0x0000000007B10000-0x0000000007B2A000-memory.dmpFilesize
104KB
-
memory/2396-4943-0x0000000007AF0000-0x0000000007AF8000-memory.dmpFilesize
32KB
-
memory/2396-4946-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2396-4908-0x0000000005640000-0x0000000005C6A000-memory.dmpFilesize
6.2MB
-
memory/2396-4907-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2504-4901-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2504-4902-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2504-4903-0x00000000059A0000-0x0000000005A3C000-memory.dmpFilesize
624KB
-
memory/2504-4904-0x0000000005880000-0x00000000058E6000-memory.dmpFilesize
408KB
-
memory/2504-4905-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2504-4968-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB
-
memory/2504-4969-0x0000000074EA0000-0x0000000075651000-memory.dmpFilesize
7.7MB