Malware Analysis Report

2024-09-11 13:52

Sample ID 240615-m7acrssanr
Target Yandex Music.exe
SHA256 49baec577965e592ac1b646cbc8a669ad597bfc1c3bac56dbf5ae414a79f1c24
Tags
xworm execution persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

49baec577965e592ac1b646cbc8a669ad597bfc1c3bac56dbf5ae414a79f1c24

Threat Level: Known bad

The file Yandex Music.exe was found to be: Known bad.

Malicious Activity Summary

xworm execution persistence rat trojan

Detect Xworm Payload

Xworm

Xworm family

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Checks computer location settings

Drops startup file

Adds Run key to start application

Looks up external IP address via web service

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-15 11:05

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm family

xworm

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 11:05

Reported

2024-06-15 11:08

Platform

win7-20240508-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Xworm

trojan rat xworm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Svchost.lnk C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Svchost.lnk C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Svchost.exe N/A
N/A N/A C:\ProgramData\Svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Svchost = "C:\\ProgramData\\Svchost.exe" C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Svchost.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2928 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2928 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\schtasks.exe
PID 2928 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\schtasks.exe
PID 2928 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe C:\Windows\System32\schtasks.exe
PID 2940 wrote to memory of 816 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe
PID 2940 wrote to memory of 816 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe
PID 2940 wrote to memory of 816 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe
PID 2940 wrote to memory of 1448 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe
PID 2940 wrote to memory of 1448 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe
PID 2940 wrote to memory of 1448 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\Svchost.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe

"C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Yandex Music.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Svchost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Svchost.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Svchost" /tr "C:\ProgramData\Svchost.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {0ACAA326-9C27-447F-AB02-89AA47075AF3} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 api.telegram.org udp
US 8.8.8.8:53 may-transmit.gl.at.ply.gg udp

Files

memory/2928-0-0x000007FEF5E43000-0x000007FEF5E44000-memory.dmp

memory/2928-1-0x0000000000C60000-0x0000000000C88000-memory.dmp

memory/2928-2-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

memory/2616-8-0x0000000002D90000-0x0000000002E10000-memory.dmp

memory/2928-7-0x000007FEF5E43000-0x000007FEF5E44000-memory.dmp

memory/2616-9-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

memory/2616-10-0x0000000001E70000-0x0000000001E78000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 469e967e753594d31bd9512d4e45b266
SHA1 04c434eb5e6d206b5372891f423cfd5bf4c55fa7
SHA256 3d7c48da8efe248f9448c17549d0975b3e8244b07eb5f036d95326425db515e1
SHA512 79660f2b5bf0ca7815ac2fa5ab5ce10749bcddd539d36b59f3b3c118fac39f0f2f600d91161ee383b17a39acddfadced3895d4cfb589c993f4df4912c256849d

memory/2476-17-0x00000000021D0000-0x00000000021D8000-memory.dmp

memory/2476-16-0x000000001B590000-0x000000001B872000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2928-34-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

C:\ProgramData\Svchost.exe

MD5 dd5b316ece86e5b0c359ba72434c1db8
SHA1 55d021a330376a0255b9a4dbc421f1398e620e23
SHA256 49baec577965e592ac1b646cbc8a669ad597bfc1c3bac56dbf5ae414a79f1c24
SHA512 fc897f4e8ce6ab650714344201634eff390dd307beb802df204fea7e46aa0acac1f7651493a18ce4df73299dbbb169a70d0b91fdf168beb01cfb120f8afbb5af

memory/816-38-0x0000000001290000-0x00000000012B8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 11:05

Reported

2024-06-15 11:08

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Xworm

trojan rat xworm

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Svchost.lnk C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Svchost.lnk C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Svchost.exe N/A
N/A N/A C:\ProgramData\Svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Svchost = "C:\\ProgramData\\Svchost.exe" C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Svchost.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Svchost.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe

"C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Yandex Music.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Yandex Music.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Svchost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Svchost.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Svchost" /tr "C:\ProgramData\Svchost.exe"

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

C:\ProgramData\Svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 api.telegram.org udp

Files

memory/1748-0-0x00007FF89DDC3000-0x00007FF89DDC5000-memory.dmp

memory/1748-1-0x0000000000620000-0x0000000000648000-memory.dmp

memory/1748-2-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

memory/4960-12-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pcxu1n2j.yve.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4960-13-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

memory/4960-14-0x000001A9CB900000-0x000001A9CB922000-memory.dmp

memory/4960-15-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

memory/4960-18-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 77d622bb1a5b250869a3238b9bc1402b
SHA1 d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256 f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512 d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 ba169f4dcbbf147fe78ef0061a95e83b
SHA1 92a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA256 5ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA512 8d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 4178a021dab6578724f63a6a72b9b13b
SHA1 8e5d61c21edaafe4e2257ebe53f9b37b723838b7
SHA256 347338241585c510bb1fafae13447879318610ca4d844b0e73089957911d77fe
SHA512 0f49991948129415c2a02298072055d4de521e4a8cb9ae887bb2096683668fcb491b99d58fd6e239463a5ac981d756c4b2827cb52c1e1253b9cb114095e140c9

memory/1748-57-0x00007FF89DDC0000-0x00007FF89E881000-memory.dmp

C:\ProgramData\Svchost.exe

MD5 dd5b316ece86e5b0c359ba72434c1db8
SHA1 55d021a330376a0255b9a4dbc421f1398e620e23
SHA256 49baec577965e592ac1b646cbc8a669ad597bfc1c3bac56dbf5ae414a79f1c24
SHA512 fc897f4e8ce6ab650714344201634eff390dd307beb802df204fea7e46aa0acac1f7651493a18ce4df73299dbbb169a70d0b91fdf168beb01cfb120f8afbb5af

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Svchost.exe.log

MD5 2ff39f6c7249774be85fd60a8f9a245e
SHA1 684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256 e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA512 1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1