Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 09:13
Behavioral task
behavioral1
Sample
nerat.exe
Resource
win7-20240611-en
General
-
Target
nerat.exe
-
Size
61KB
-
MD5
60797170ebbe376274cf30e64b127706
-
SHA1
648e9c31b92f4d3fb93e7ca8be73836883c41538
-
SHA256
405bdae4a67cc4a4e5a9d2f39acd2ea34f5054f4caa8b085f03bb1286dfb5105
-
SHA512
754d72a6b2a5428e64f0d8d58be0bd89a5f6a7c9ec646d08bccc981adf06567ab5191ba0a7768efe8ee8781bcd216e404a0ebaf55992a151e5536e26f8a93559
-
SSDEEP
1536:WzPVaddkiWRZrtTAdBxmiABbARE4TKQDmjav6/LnkO8AqYZP:Wz4CLTA9mi+bARsbLnkO8AxZP
Malware Config
Extracted
xworm
127.0.0.1:32901
engineering-thoroughly.gl.at.ply.gg:32901
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
44caliber
https://discord.com/api/webhooks/1131711873008549938/QPUFf0SJyyBKkmbeY9YgkuN6uIphQMrfHrESgo7LDLk9M-ZHEC2H2R-LmRpRgJMYG97X
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2012-1-0x00000000002C0000-0x00000000002D6000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2636 powershell.exe 2460 powershell.exe 1748 powershell.exe 2592 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk nerat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk nerat.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 yriayk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 freegeoip.app 2 ip-api.com 9 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2592 powershell.exe 2636 powershell.exe 2460 powershell.exe 1748 powershell.exe 2268 yriayk.exe 2268 yriayk.exe 2268 yriayk.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2012 nerat.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 2012 nerat.exe Token: SeDebugPrivilege 2268 yriayk.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2592 2012 nerat.exe 29 PID 2012 wrote to memory of 2592 2012 nerat.exe 29 PID 2012 wrote to memory of 2592 2012 nerat.exe 29 PID 2012 wrote to memory of 2636 2012 nerat.exe 31 PID 2012 wrote to memory of 2636 2012 nerat.exe 31 PID 2012 wrote to memory of 2636 2012 nerat.exe 31 PID 2012 wrote to memory of 2460 2012 nerat.exe 33 PID 2012 wrote to memory of 2460 2012 nerat.exe 33 PID 2012 wrote to memory of 2460 2012 nerat.exe 33 PID 2012 wrote to memory of 1748 2012 nerat.exe 35 PID 2012 wrote to memory of 1748 2012 nerat.exe 35 PID 2012 wrote to memory of 1748 2012 nerat.exe 35 PID 2012 wrote to memory of 2268 2012 nerat.exe 46 PID 2012 wrote to memory of 2268 2012 nerat.exe 46 PID 2012 wrote to memory of 2268 2012 nerat.exe 46 PID 2268 wrote to memory of 1580 2268 yriayk.exe 47 PID 2268 wrote to memory of 1580 2268 yriayk.exe 47 PID 2268 wrote to memory of 1580 2268 yriayk.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\nerat.exe"C:\Users\Admin\AppData\Local\Temp\nerat.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\nerat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'nerat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\yriayk.exe"C:\Users\Admin\AppData\Local\Temp\yriayk.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2268 -s 10843⤵PID:1580
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2932
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD53d3676c2d36ed1af59c1815af1f74058
SHA1fc384ba05ea668dfba796b14c34e6056fd0f94b8
SHA25653705a5afba7eccd5f2628d61c4c0bbdcc267e8fe1bdbd32f98b154806f11aa6
SHA5123cc2c941082ee926efaa0cb015785321b4090e41abfdcfe7e6484ee414498e0fd6f46ceaee86110795ea6fec5e6456d46d4e6b8d65cbf58e635d1daf0f673fdc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD550e9c012e7a2de38946fa9f668d5f0fb
SHA1fa444da71e82cd667d40818f21280e9fdb4ab89c
SHA256c98561db3592909b10cd1ebf65e78fa19b3baedc885655138f8e70530f91ad74
SHA512f6ac95bfa49cf472c136ece0588c76e0538200b9a25b57a7f4c594a8424dc4792f3d8ef1d071e99909da4fe8584dc279eb1758364b1e4bf41a36db74d20729a1