Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 10:54
Behavioral task
behavioral1
Sample
rerdsa.exe
Resource
win7-20240508-en
General
-
Target
rerdsa.exe
-
Size
72KB
-
MD5
5b3a52ad2fc314e411d5719a7015b07b
-
SHA1
ca6c701a1bc285f7b9afdec944d9dbf15ca8dd8f
-
SHA256
150fb7fed020ccb73bcc45318b1b3ad5a53b61812187153c0a64e51eec05c432
-
SHA512
26c7830b7beef06d2fd7e5d8992445b000f84c953d7939c5180884e2c24caa1c19d84740a772ec7df894f7ec88d878d5a4a3a26db42967f5d67a0b001e2438c6
-
SSDEEP
1536:gsGRbC/RYhIpSiyyLm9Jwy2t7iHb5x9p3oHR6d45arOrdxnwMGp58:950iDLyJitWHb5Vm5SOrdxnwnp58
Malware Config
Extracted
xworm
127.0.0.1:23386
cameras-happen.gl.at.ply.gg:23386
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2900-1-0x00000000011F0000-0x0000000001208000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2520 powershell.exe 1288 powershell.exe 2836 powershell.exe 2496 powershell.exe -
Drops startup file 2 IoCs
Processes:
rerdsa.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk rerdsa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk rerdsa.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2496 powershell.exe 2520 powershell.exe 1288 powershell.exe 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
rerdsa.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2900 rerdsa.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2900 rerdsa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
rerdsa.exedescription pid process target process PID 2900 wrote to memory of 2496 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2496 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2496 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2520 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2520 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2520 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 1288 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 1288 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 1288 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2836 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2836 2900 rerdsa.exe powershell.exe PID 2900 wrote to memory of 2836 2900 rerdsa.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rerdsa.exe"C:\Users\Admin\AppData\Local\Temp\rerdsa.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\rerdsa.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'rerdsa.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R0DHO01UYGOWOEMESWBQ.tempFilesize
7KB
MD59b327b3268d63d905c3a0fffad4abd70
SHA18115da31c5605088e0d11ea6c6e10326197c305d
SHA25649d92535b04f4e417a655c383e8b14397e51245a40ce21edf93e5d33d7e1834e
SHA512f4717b3c1a1adafc683cf2ab1359ac098b820d9d1f6e45dfe53de52b99192c946732f304f18d94b5421d232aebb79136e84c70ec3c99d4ee8ee64bf40cb70c46
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2496-8-0x0000000001D50000-0x0000000001DD0000-memory.dmpFilesize
512KB
-
memory/2496-9-0x000000001B780000-0x000000001BA62000-memory.dmpFilesize
2.9MB
-
memory/2496-10-0x0000000001E90000-0x0000000001E98000-memory.dmpFilesize
32KB
-
memory/2520-16-0x000000001B700000-0x000000001B9E2000-memory.dmpFilesize
2.9MB
-
memory/2520-17-0x0000000001D90000-0x0000000001D98000-memory.dmpFilesize
32KB
-
memory/2900-0-0x000007FEF5353000-0x000007FEF5354000-memory.dmpFilesize
4KB
-
memory/2900-1-0x00000000011F0000-0x0000000001208000-memory.dmpFilesize
96KB
-
memory/2900-2-0x000007FEF5350000-0x000007FEF5D3C000-memory.dmpFilesize
9.9MB
-
memory/2900-3-0x000007FEF5353000-0x000007FEF5354000-memory.dmpFilesize
4KB
-
memory/2900-33-0x000007FEF5350000-0x000007FEF5D3C000-memory.dmpFilesize
9.9MB