Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 05:09
Static task
static1
General
-
Target
Ystnmcdkpe.exe
-
Size
4.4MB
-
MD5
8b0d717feebe54e596342f8fd0dcb304
-
SHA1
5c2bdfaf250c6d1f1cdaeac8da1d0e2fd38a756e
-
SHA256
e76432493aab33f8765d104d3bbd345b5e8eafafea96b49e462e26b688ba85cf
-
SHA512
5c71f2e989164f3ac9aef87aa05e628b4d9f1df0bb868d9d09e2a058ca3f6b01f2357580e834f60d3d0ce284301ef7dd0663fe7ded7e777c9cfb39c5f7335d33
-
SSDEEP
24576:cLjLCNZ9fxjFe10SzsLfZJCF2Q05l+XWMOStU1w0JK7OgK7NHDOebaHdH3ckeubt:m
Malware Config
Extracted
xworm
5.0
Mc35OpRlVfHYgK3s
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1236-4902-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 852 powershell.exe 1444 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ystnmcdkpe.exedescription pid process target process PID 1540 set thread context of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Ystnmcdkpe.exepowershell.exepowershell.exeYstnmcdkpe.exepid process 1540 Ystnmcdkpe.exe 852 powershell.exe 852 powershell.exe 1444 powershell.exe 1444 powershell.exe 1236 Ystnmcdkpe.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Ystnmcdkpe.exeYstnmcdkpe.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1540 Ystnmcdkpe.exe Token: SeDebugPrivilege 1540 Ystnmcdkpe.exe Token: SeDebugPrivilege 1236 Ystnmcdkpe.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1236 Ystnmcdkpe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Ystnmcdkpe.exepid process 1236 Ystnmcdkpe.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Ystnmcdkpe.exeYstnmcdkpe.exedescription pid process target process PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1540 wrote to memory of 1236 1540 Ystnmcdkpe.exe Ystnmcdkpe.exe PID 1236 wrote to memory of 852 1236 Ystnmcdkpe.exe powershell.exe PID 1236 wrote to memory of 852 1236 Ystnmcdkpe.exe powershell.exe PID 1236 wrote to memory of 852 1236 Ystnmcdkpe.exe powershell.exe PID 1236 wrote to memory of 1444 1236 Ystnmcdkpe.exe powershell.exe PID 1236 wrote to memory of 1444 1236 Ystnmcdkpe.exe powershell.exe PID 1236 wrote to memory of 1444 1236 Ystnmcdkpe.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ystnmcdkpe.exe"C:\Users\Admin\AppData\Local\Temp\Ystnmcdkpe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Ystnmcdkpe.exe"C:\Users\Admin\AppData\Local\Temp\Ystnmcdkpe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Ystnmcdkpe.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ystnmcdkpe.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ystnmcdkpe.exe.logFilesize
805B
MD59d0cacca373731660e8268a162d9d4ff
SHA1a82111d00132cdf7ef46af5681601d55c6a0e17c
SHA25695932f81206717ff86f0974ee37dc40d5d914f730f00a08344b4c1765d663394
SHA5128c971ab501fc322b13f53b03325b2295e1eedb12b6d50a4225e6e3b4bf5128665b1a3d8b560a8b04f14bfa6f5cba41058e4f546139101fc303f3b8393f5ca485
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5afe136a4141228176741e3771e0c1bfb
SHA1eb28819b3ab290cd85008ac3673b2ce8c7eae70f
SHA256a65405c3792f1bcf58abeacd7170a5b4580e3a9be2eab962cbc73249c0b77137
SHA512ff32c42219327ca1ac1784e45cae65e27d3a27700559e6b544988474eb76d23dfe13297d7e4546209262b3a6047dc77c0b0fc6b6561b0d2eee6bab520b175f84
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5ecxblm.ths.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/852-4947-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/852-4925-0x000000006F730000-0x000000006F77C000-memory.dmpFilesize
304KB
-
memory/852-4906-0x0000000002A40000-0x0000000002A76000-memory.dmpFilesize
216KB
-
memory/852-4907-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/852-4908-0x0000000005460000-0x0000000005A8A000-memory.dmpFilesize
6.2MB
-
memory/852-4909-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/852-4944-0x0000000007880000-0x0000000007888000-memory.dmpFilesize
32KB
-
memory/852-4943-0x00000000078A0000-0x00000000078BA000-memory.dmpFilesize
104KB
-
memory/852-4942-0x0000000007790000-0x00000000077A5000-memory.dmpFilesize
84KB
-
memory/852-4941-0x0000000007780000-0x000000000778E000-memory.dmpFilesize
56KB
-
memory/852-4940-0x0000000007750000-0x0000000007761000-memory.dmpFilesize
68KB
-
memory/852-4939-0x00000000077E0000-0x0000000007876000-memory.dmpFilesize
600KB
-
memory/852-4938-0x00000000075B0000-0x00000000075BA000-memory.dmpFilesize
40KB
-
memory/852-4937-0x0000000007540000-0x000000000755A000-memory.dmpFilesize
104KB
-
memory/852-4936-0x0000000007B80000-0x00000000081FA000-memory.dmpFilesize
6.5MB
-
memory/852-4935-0x0000000007410000-0x00000000074B4000-memory.dmpFilesize
656KB
-
memory/852-4934-0x00000000071F0000-0x000000000720E000-memory.dmpFilesize
120KB
-
memory/852-4910-0x0000000005B80000-0x0000000005BA2000-memory.dmpFilesize
136KB
-
memory/852-4924-0x00000000071B0000-0x00000000071E4000-memory.dmpFilesize
208KB
-
memory/852-4923-0x0000000006220000-0x000000000626C000-memory.dmpFilesize
304KB
-
memory/852-4922-0x00000000061E0000-0x00000000061FE000-memory.dmpFilesize
120KB
-
memory/852-4920-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/852-4921-0x0000000005D70000-0x00000000060C7000-memory.dmpFilesize
3.3MB
-
memory/852-4911-0x0000000005C20000-0x0000000005C86000-memory.dmpFilesize
408KB
-
memory/1236-4971-0x0000000006DC0000-0x0000000006DCC000-memory.dmpFilesize
48KB
-
memory/1236-4901-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1236-4970-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1236-4969-0x0000000006C60000-0x0000000006C6A000-memory.dmpFilesize
40KB
-
memory/1236-4905-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1236-4904-0x00000000052F0000-0x0000000005356000-memory.dmpFilesize
408KB
-
memory/1236-4972-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1236-4903-0x0000000005250000-0x00000000052EC000-memory.dmpFilesize
624KB
-
memory/1236-4902-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1444-4959-0x000000006F730000-0x000000006F77C000-memory.dmpFilesize
304KB
-
memory/1444-4949-0x0000000005630000-0x0000000005987000-memory.dmpFilesize
3.3MB
-
memory/1540-54-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-36-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-4894-0x0000000006A30000-0x0000000006A7C000-memory.dmpFilesize
304KB
-
memory/1540-4895-0x0000000006AE0000-0x0000000006B34000-memory.dmpFilesize
336KB
-
memory/1540-4900-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1540-4892-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1540-4891-0x0000000074660000-0x0000000074E11000-memory.dmpFilesize
7.7MB
-
memory/1540-28-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-34-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-38-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-6-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-8-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-10-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-12-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-16-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-19-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-22-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-24-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-26-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-30-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-32-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-4893-0x00000000069D0000-0x0000000006A2C000-memory.dmpFilesize
368KB
-
memory/1540-42-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-46-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-0-0x000000007466E000-0x000000007466F000-memory.dmpFilesize
4KB
-
memory/1540-41-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-44-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-48-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-50-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-56-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-58-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-60-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-62-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-65-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-68-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-66-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-53-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-20-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-5-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-14-0x0000000006600000-0x000000000681B000-memory.dmpFilesize
2.1MB
-
memory/1540-4-0x00000000068C0000-0x0000000006952000-memory.dmpFilesize
584KB
-
memory/1540-3-0x0000000006DD0000-0x0000000007376000-memory.dmpFilesize
5.6MB
-
memory/1540-2-0x0000000006600000-0x0000000006820000-memory.dmpFilesize
2.1MB
-
memory/1540-1-0x0000000000480000-0x00000000008EE000-memory.dmpFilesize
4.4MB