Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
Dgvuwnyy.exe
Resource
win11-20240508-en
General
-
Target
Dgvuwnyy.exe
-
Size
4.6MB
-
MD5
2bfed353f3617b684f1d6b6cc9c013b2
-
SHA1
ce8c3cefeb36dfe72fdabf895dd91b497a4280c6
-
SHA256
df73b9b36922057468e7c5175d9427ee3548c3989cf1076e0a7ab435ec9d901f
-
SHA512
1e8d510e901c626cce9507007449bd1b533fced0a3c1d6e841053f70859ac67d18085b9731717ec2681803d12e10305349dee4a0c974b4a06ac34710826e189b
-
SSDEEP
24576:rucL0k2Wdq5akyN/NyACoooc1jTn6ML8qdrhwYjPDetSqk02C/CUXbZZs7gq4Ss8:k
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2392-4901-0x0000000000400000-0x0000000000434000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 804 powershell.exe 2032 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Dgvuwnyy.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\Docker \\.exe" Dgvuwnyy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 5 pastebin.com 9 pastebin.com 11 pastebin.com 12 pastebin.com 13 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Dgvuwnyy.exedescription pid process target process PID 2632 set thread context of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Dgvuwnyy.exepowershell.exepowershell.exepid process 2632 Dgvuwnyy.exe 804 powershell.exe 804 powershell.exe 2032 powershell.exe 2032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Dgvuwnyy.exeDgvuwnyy.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2632 Dgvuwnyy.exe Token: SeDebugPrivilege 2632 Dgvuwnyy.exe Token: SeDebugPrivilege 2392 Dgvuwnyy.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Dgvuwnyy.exeDgvuwnyy.exedescription pid process target process PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2632 wrote to memory of 2392 2632 Dgvuwnyy.exe Dgvuwnyy.exe PID 2392 wrote to memory of 804 2392 Dgvuwnyy.exe powershell.exe PID 2392 wrote to memory of 804 2392 Dgvuwnyy.exe powershell.exe PID 2392 wrote to memory of 804 2392 Dgvuwnyy.exe powershell.exe PID 2392 wrote to memory of 2032 2392 Dgvuwnyy.exe powershell.exe PID 2392 wrote to memory of 2032 2392 Dgvuwnyy.exe powershell.exe PID 2392 wrote to memory of 2032 2392 Dgvuwnyy.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dgvuwnyy.exe"C:\Users\Admin\AppData\Local\Temp\Dgvuwnyy.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Dgvuwnyy.exe"C:\Users\Admin\AppData\Local\Temp\Dgvuwnyy.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Dgvuwnyy.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Dgvuwnyy.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dgvuwnyy.exe.logFilesize
805B
MD59d0cacca373731660e8268a162d9d4ff
SHA1a82111d00132cdf7ef46af5681601d55c6a0e17c
SHA25695932f81206717ff86f0974ee37dc40d5d914f730f00a08344b4c1765d663394
SHA5128c971ab501fc322b13f53b03325b2295e1eedb12b6d50a4225e6e3b4bf5128665b1a3d8b560a8b04f14bfa6f5cba41058e4f546139101fc303f3b8393f5ca485
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD552fc09166726158c47c1b9559c374090
SHA106112084b06f32dcee8250295ed7083e9bbabb5e
SHA25655694108bf694201b4fdd293eeb69e90650c1273080756f36fc7d884ea0f3b9b
SHA512ddcbe20592c0a50677a9dc51f3da12790d9a022742c60f7d182c08c0fe10fa998376fcd32b7f32c2a598ca4a5d9d0b6d0be1c7adf28fdac91084bb5e7d229810
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_akomvnii.zue.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/804-4925-0x000000006FD30000-0x000000006FD7C000-memory.dmpFilesize
304KB
-
memory/804-4923-0x0000000005CC0000-0x0000000005D0C000-memory.dmpFilesize
304KB
-
memory/804-4948-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/804-4945-0x0000000007260000-0x0000000007268000-memory.dmpFilesize
32KB
-
memory/804-4906-0x00000000023D0000-0x0000000002406000-memory.dmpFilesize
216KB
-
memory/804-4943-0x0000000007280000-0x000000000729A000-memory.dmpFilesize
104KB
-
memory/804-4942-0x0000000007170000-0x0000000007185000-memory.dmpFilesize
84KB
-
memory/804-4941-0x0000000007160000-0x000000000716E000-memory.dmpFilesize
56KB
-
memory/804-4940-0x0000000007130000-0x0000000007141000-memory.dmpFilesize
68KB
-
memory/804-4939-0x00000000071C0000-0x0000000007256000-memory.dmpFilesize
600KB
-
memory/804-4938-0x0000000006F90000-0x0000000006F9A000-memory.dmpFilesize
40KB
-
memory/804-4937-0x0000000006F20000-0x0000000006F3A000-memory.dmpFilesize
104KB
-
memory/804-4936-0x0000000007570000-0x0000000007BEA000-memory.dmpFilesize
6.5MB
-
memory/804-4935-0x0000000006DF0000-0x0000000006E94000-memory.dmpFilesize
656KB
-
memory/804-4909-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/804-4934-0x0000000006D90000-0x0000000006DAE000-memory.dmpFilesize
120KB
-
memory/804-4924-0x0000000006DB0000-0x0000000006DE4000-memory.dmpFilesize
208KB
-
memory/804-4910-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/804-4922-0x0000000005BD0000-0x0000000005BEE000-memory.dmpFilesize
120KB
-
memory/804-4921-0x00000000056E0000-0x0000000005A37000-memory.dmpFilesize
3.3MB
-
memory/804-4908-0x0000000004EE0000-0x000000000550A000-memory.dmpFilesize
6.2MB
-
memory/804-4911-0x0000000004E30000-0x0000000004E52000-memory.dmpFilesize
136KB
-
memory/804-4912-0x0000000005600000-0x0000000005666000-memory.dmpFilesize
408KB
-
memory/804-4907-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2032-4958-0x0000000006040000-0x0000000006397000-memory.dmpFilesize
3.3MB
-
memory/2032-4960-0x000000006FD30000-0x000000006FD7C000-memory.dmpFilesize
304KB
-
memory/2392-4970-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2392-4944-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2392-4905-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2392-4904-0x0000000005A30000-0x0000000005A96000-memory.dmpFilesize
408KB
-
memory/2392-4901-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2392-4903-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2392-4902-0x0000000005960000-0x00000000059FC000-memory.dmpFilesize
624KB
-
memory/2632-50-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-40-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-4892-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2632-4893-0x0000000005D20000-0x0000000005D8E000-memory.dmpFilesize
440KB
-
memory/2632-4894-0x0000000005D90000-0x0000000005DDC000-memory.dmpFilesize
304KB
-
memory/2632-4895-0x0000000005A90000-0x0000000005AE4000-memory.dmpFilesize
336KB
-
memory/2632-5-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-4900-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2632-18-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-24-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-9-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-10-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-14-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-16-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-20-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-22-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-28-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-30-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-32-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-34-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-36-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-4891-0x0000000074C00000-0x00000000753B1000-memory.dmpFilesize
7.7MB
-
memory/2632-42-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-44-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-0-0x0000000074C0E000-0x0000000074C0F000-memory.dmpFilesize
4KB
-
memory/2632-52-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-54-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-66-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-56-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-64-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-69-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-58-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-60-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-62-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-26-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-38-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-46-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-48-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-12-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-6-0x0000000006CC0000-0x0000000006EED000-memory.dmpFilesize
2.2MB
-
memory/2632-4-0x0000000006F90000-0x0000000007022000-memory.dmpFilesize
584KB
-
memory/2632-3-0x00000000074A0000-0x0000000007A46000-memory.dmpFilesize
5.6MB
-
memory/2632-2-0x0000000006CC0000-0x0000000006EF2000-memory.dmpFilesize
2.2MB
-
memory/2632-1-0x0000000000AD0000-0x0000000000F62000-memory.dmpFilesize
4.6MB