Analysis
-
max time kernel
60s -
max time network
55s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
Xkezr.exe
Resource
win11-20240611-en
General
-
Target
Xkezr.exe
-
Size
4.4MB
-
MD5
ead806a16c4198d3a7d2a3363163a23c
-
SHA1
5aff3ab5c3e33c67da67939283146bb40d7de590
-
SHA256
3a16591b64920fda9ac2651df05629cc2b18c02cd52150a90bcc760126f879fd
-
SHA512
cc21ba173d3bcfb8cee2bdb974ed7977c7d296a1df62c8995dfb23fb0a95745b2c6dc6474e7c1bae5cea3508ab1456eb26ff3ce07abeb9ff315f6f3953da0276
-
SSDEEP
24576:E7tZaQDorp0bIwoITdpXsRQ87KaC68Z3V51l90bAsWE3ug7dDlgE8Yi+Svt/1F93:EB
Malware Config
Extracted
xworm
5.0
Mc35OpRlVfHYgK3s
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/860-4902-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 3432 powershell.exe 1312 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Xkezr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ilvrcqkyi = "C:\\Users\\Admin\\AppData\\Roaming\\Ilvrcqkyi.exe" Xkezr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Xkezr.exedescription pid process target process PID 764 set thread context of 860 764 Xkezr.exe Xkezr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Xkezr.exepowershell.exepowershell.exeXkezr.exepid process 764 Xkezr.exe 3432 powershell.exe 3432 powershell.exe 1312 powershell.exe 1312 powershell.exe 860 Xkezr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Xkezr.exeXkezr.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 764 Xkezr.exe Token: SeDebugPrivilege 764 Xkezr.exe Token: SeDebugPrivilege 860 Xkezr.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 860 Xkezr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Xkezr.exepid process 860 Xkezr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Xkezr.exeXkezr.exedescription pid process target process PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 764 wrote to memory of 860 764 Xkezr.exe Xkezr.exe PID 860 wrote to memory of 3432 860 Xkezr.exe powershell.exe PID 860 wrote to memory of 3432 860 Xkezr.exe powershell.exe PID 860 wrote to memory of 3432 860 Xkezr.exe powershell.exe PID 860 wrote to memory of 1312 860 Xkezr.exe powershell.exe PID 860 wrote to memory of 1312 860 Xkezr.exe powershell.exe PID 860 wrote to memory of 1312 860 Xkezr.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xkezr.exe"C:\Users\Admin\AppData\Local\Temp\Xkezr.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Xkezr.exe"C:\Users\Admin\AppData\Local\Temp\Xkezr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xkezr.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xkezr.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Xkezr.exe.logFilesize
805B
MD59d0cacca373731660e8268a162d9d4ff
SHA1a82111d00132cdf7ef46af5681601d55c6a0e17c
SHA25695932f81206717ff86f0974ee37dc40d5d914f730f00a08344b4c1765d663394
SHA5128c971ab501fc322b13f53b03325b2295e1eedb12b6d50a4225e6e3b4bf5128665b1a3d8b560a8b04f14bfa6f5cba41058e4f546139101fc303f3b8393f5ca485
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5099cf247a27e0c512c29225080270dc1
SHA1ba96dd3c81e3c6293f04420ed355c5463844e464
SHA2565a6acc6cda30fb0a1a5fbc30f6b6067452eaa579c50d053841bfa8cc8ec17f0b
SHA512b140136d9d6cf7c7e01ec10edada82f5914a45513a42775617fa9a2bd2e7a3a7c73337b6d44337636239575962f685a8346ef3dd09dfc09cf6037be59297d944
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n2al2lox.ohd.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/764-28-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-36-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-2-0x00000000061E0000-0x0000000006400000-memory.dmpFilesize
2.1MB
-
memory/764-3-0x00000000069B0000-0x0000000006F56000-memory.dmpFilesize
5.6MB
-
memory/764-4-0x00000000064A0000-0x0000000006532000-memory.dmpFilesize
584KB
-
memory/764-5-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-20-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-48-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-60-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-68-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-66-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-64-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-63-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-58-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-56-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-54-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-52-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-50-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-46-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-42-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-44-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-0-0x000000007501E000-0x000000007501F000-memory.dmpFilesize
4KB
-
memory/764-34-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-32-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-30-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-26-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-22-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-18-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-16-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-14-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-12-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-10-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-8-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-6-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-40-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-38-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-24-0x00000000061E0000-0x00000000063FB000-memory.dmpFilesize
2.1MB
-
memory/764-1-0x0000000000080000-0x00000000004F0000-memory.dmpFilesize
4.4MB
-
memory/764-4891-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/764-4892-0x00000000065D0000-0x000000000662C000-memory.dmpFilesize
368KB
-
memory/764-4893-0x0000000006630000-0x000000000667C000-memory.dmpFilesize
304KB
-
memory/764-4894-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/764-4895-0x00000000066E0000-0x0000000006734000-memory.dmpFilesize
336KB
-
memory/764-4900-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/860-4969-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/860-4901-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/860-4903-0x0000000005C80000-0x0000000005D1C000-memory.dmpFilesize
624KB
-
memory/860-4904-0x0000000005D20000-0x0000000005D86000-memory.dmpFilesize
408KB
-
memory/860-4902-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/860-4905-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/860-4968-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/860-4967-0x00000000076C0000-0x00000000076CA000-memory.dmpFilesize
40KB
-
memory/1312-4957-0x00000000700E0000-0x000000007012C000-memory.dmpFilesize
304KB
-
memory/3432-4923-0x0000000007A20000-0x0000000007A54000-memory.dmpFilesize
208KB
-
memory/3432-4936-0x0000000007BC0000-0x0000000007BDA000-memory.dmpFilesize
104KB
-
memory/3432-4916-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/3432-4920-0x0000000006370000-0x00000000066C7000-memory.dmpFilesize
3.3MB
-
memory/3432-4921-0x0000000006860000-0x000000000687E000-memory.dmpFilesize
120KB
-
memory/3432-4922-0x00000000068A0000-0x00000000068EC000-memory.dmpFilesize
304KB
-
memory/3432-4910-0x0000000006290000-0x00000000062F6000-memory.dmpFilesize
408KB
-
memory/3432-4924-0x00000000700E0000-0x000000007012C000-memory.dmpFilesize
304KB
-
memory/3432-4933-0x0000000007A80000-0x0000000007A9E000-memory.dmpFilesize
120KB
-
memory/3432-4934-0x0000000007AA0000-0x0000000007B44000-memory.dmpFilesize
656KB
-
memory/3432-4935-0x0000000008200000-0x000000000887A000-memory.dmpFilesize
6.5MB
-
memory/3432-4909-0x00000000061F0000-0x0000000006212000-memory.dmpFilesize
136KB
-
memory/3432-4937-0x0000000007C30000-0x0000000007C3A000-memory.dmpFilesize
40KB
-
memory/3432-4938-0x0000000007E60000-0x0000000007EF6000-memory.dmpFilesize
600KB
-
memory/3432-4939-0x0000000007DD0000-0x0000000007DE1000-memory.dmpFilesize
68KB
-
memory/3432-4940-0x0000000007E00000-0x0000000007E0E000-memory.dmpFilesize
56KB
-
memory/3432-4941-0x0000000007E10000-0x0000000007E25000-memory.dmpFilesize
84KB
-
memory/3432-4907-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB
-
memory/3432-4908-0x0000000005A90000-0x00000000060BA000-memory.dmpFilesize
6.2MB
-
memory/3432-4906-0x0000000003070000-0x00000000030A6000-memory.dmpFilesize
216KB
-
memory/3432-4942-0x0000000007F20000-0x0000000007F3A000-memory.dmpFilesize
104KB
-
memory/3432-4943-0x0000000007F00000-0x0000000007F08000-memory.dmpFilesize
32KB
-
memory/3432-4946-0x0000000075010000-0x00000000757C1000-memory.dmpFilesize
7.7MB