Analysis
-
max time kernel
104s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/06/2024, 17:16
Behavioral task
behavioral1
Sample
dll.exe
Resource
win11-20240419-en
General
-
Target
dll.exe
-
Size
82KB
-
MD5
9468c29751cb71821132a85046514acc
-
SHA1
b752a90922804417327e3cc5375eea82f4d4c4a0
-
SHA256
c93306914007b9770d6703be32691fc73a38f6373c74d30b6d0afd1906c1faeb
-
SHA512
8a29161d0d0aacdadeef39f0760a0287fda89be622ae58959d7ff2801b04b476b69e2191e399b3900346e1c7ac799ef7e2bfa288768cc648cf114f6405ac79e7
-
SSDEEP
1536:IwqAbo29p4HcTQviSuDFs26Ha8nJgRvqb5RNcfdblQu+x1zYOE0U4GrZW:NPpTQqtDW26Ha8Vb51JYOHU4AW
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
Runtime Broker.exe
-
pastebin_url
https://pastebin.com/raw/VT213gz9
-
telegram
https://api.telegram.org/bot6557690107:AAGE33Usx8HvMpu0f9cIxbOjvXAd1gMz8t4/sendMessage?chat_id=1324649577
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3036-1-0x0000000000CF0000-0x0000000000D0A000-memory.dmp family_xworm behavioral1/files/0x001d00000002ab19-50.dat family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnk dll.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnk dll.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 Runtime Broker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Broker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Runtime Broker.exe" dll.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 5 pastebin.com 9 pastebin.com 11 pastebin.com 19 pastebin.com 30 pastebin.com 36 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3468 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630318669631121" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3036 dll.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeDebugPrivilege 3652 Runtime Broker.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3468 3036 dll.exe 78 PID 3036 wrote to memory of 3468 3036 dll.exe 78 PID 4552 wrote to memory of 1836 4552 chrome.exe 83 PID 4552 wrote to memory of 1836 4552 chrome.exe 83 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 1312 4552 chrome.exe 84 PID 4552 wrote to memory of 4084 4552 chrome.exe 85 PID 4552 wrote to memory of 4084 4552 chrome.exe 85 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 PID 4552 wrote to memory of 664 4552 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dll.exe"C:\Users\Admin\AppData\Local\Temp\dll.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"2⤵
- Creates scheduled task(s)
PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9492ecc40,0x7ff9492ecc4c,0x7ff9492ecc582⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3584,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4728,i,3602984803534333577,15753549480559491059,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ffb3debcd90b084db77a9cab2ea67028
SHA1a608102b16a499d8911e95059b1e3c9e23dd9eef
SHA256542f8cc04d90bc2cb6a7f7dace1ed9dfe61fa8a24af3c62d498f50d2835c3e89
SHA5124fbd4eebe611ebac07982c3ddeb69d010cac7314b22343f41cdbfb60a3a11ee1f858997cbdaeaec5e9923145a59447219f7c5ebaea3fb462a79a16d2463d80d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5a4c1d6ee4a87d20374b2c9c9a514a088
SHA12fc9ff7b52af82a51936d40d2b4afcf892405fdf
SHA2565f2b28d81b555ee407f867c2e82c267e643e478401678d76a83bf7ecf0197f71
SHA512b54d775e26bc4afd5e22f060dd9ec0aea22ae7f36bc3bfee79151dd2599cf6a19992c84385e09d49c7101b09916df8a202f8a0bccf89fb3e93494cba115f5e92
-
Filesize
9KB
MD59b8f549de43f3f7a9cfd91fed3cfaf9e
SHA1eaa6a5ed08d555fc2b9565b26c3ab1211d0e5190
SHA25619171f373652cdbd07d0426ff1088c3058636c30e10683743f858ca87c67ae32
SHA512d0dbaa03d99184e12be1288bc8c6eccc8f28fe17691c2f11ac298322a462dd242117d97e604f728ed2f9df438de2d5087eb92a1b7af0449e761614dfc8d0d2e5
-
Filesize
9KB
MD5b66ddadfb7d86af3ca9c5115bd397e64
SHA194ae9ef58e3d68578add667b91fda1763aaa7bf0
SHA2563f8c2f915bf35312a139e8af73d6e6b733b583aafa851ee415e927663ea8b4f0
SHA512369f47b95493ace19b56d226062ebe5e73885af99fd19d0c9eb99a6b280f355ec30ff2e2df23921c2b7fafa61dbbb1718633fb9560238282d6ec26bd0831b3a6
-
Filesize
77KB
MD558d2a94b890654f96022e8b3d4e1cabf
SHA108bf3dd262454fc8dff81c310dbdb0ed2d1157e3
SHA2564437fefa1b3694ce5a241c652144febf765ae8baf2b972a5e1093257764a0889
SHA51213a1820d4c5aa66363da71f05047f2ae1d39ec8b16cba84cdd9d75d6e35f6e680ebe0bebbb08be75fcddb807b36fb13ab69c8d15e74ec8202a27989810ce2176
-
Filesize
77KB
MD5a67b67fe06e1dcab586aa87da43a8d91
SHA13b9592245ceed2095ff4a4f611ae768219f47a8c
SHA2569242b691108b72faf8969864dd9e03bd5d9a99b3f58e5996786aedfd75658407
SHA512397076b8b1a1b5cba9e06e6b132c19c2193fdd2748b6bfe885504a22309f6490d67f2bc9f642ada18a440bc85363aedcb41acfbb16c554233dc5c27d3352b906
-
Filesize
82KB
MD59468c29751cb71821132a85046514acc
SHA1b752a90922804417327e3cc5375eea82f4d4c4a0
SHA256c93306914007b9770d6703be32691fc73a38f6373c74d30b6d0afd1906c1faeb
SHA5128a29161d0d0aacdadeef39f0760a0287fda89be622ae58959d7ff2801b04b476b69e2191e399b3900346e1c7ac799ef7e2bfa288768cc648cf114f6405ac79e7