Resubmissions

01/07/2024, 15:37

240701-s2vz6ssajn 10

01/07/2024, 15:16

240701-snwdsa1gmm 10

01/07/2024, 11:15

240701-nctzcsycjd 10

01/07/2024, 11:04

240701-m6mxga1dnn 10

01/07/2024, 09:11

240701-k5xzyawfpr 10

01/07/2024, 09:08

240701-k3z2hsweqn 3

01/07/2024, 09:03

240701-k1emsswdqq 10

01/07/2024, 09:02

240701-kzrkzawdnn 10

30/06/2024, 16:46

240630-vagdtathjl 10

Analysis

  • max time kernel
    51s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 15:37

General

  • Target

    Eagles Image Logger.exe

  • Size

    6.5MB

  • MD5

    822f47134b780406c02c48e1cdab2e38

  • SHA1

    aa1c4a7b46223f663c8a8751fd3b295ab6443263

  • SHA256

    15eb341d2ff1866160269470ef52df4889a17d2ca58476a77d0c2787845888b1

  • SHA512

    652d6160ce92af854c865351f4b754d528c4493917bb1c4d54d629cf145ab006447cdc493953636acc18a1be078b06307cdac335ae0aa598a21c7d3832e0a818

  • SSDEEP

    196608:vwSbstG7ykI+gHJnHgZcrOSrGymujAoWeVO:vKG7vI+gpnKnQGyXAod

Malware Config

Extracted

Family

xworm

C2

bulletingmarrano-45523.portmap.host:45523

Attributes
  • Install_directory

    %AppData%

  • install_file

    RuntimeBroker.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eagles Image Logger.exe
    "C:\Users\Admin\AppData\Local\Temp\Eagles Image Logger.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Roaming\installer.exe
      "C:\Users\Admin\AppData\Roaming\installer.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\installer.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'installer.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2400
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1404
    • C:\Users\Admin\AppData\Roaming\Eagles Image Logger.exe
      "C:\Users\Admin\AppData\Roaming\Eagles Image Logger.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Roaming\Eagles Image Logger.exe
        "C:\Users\Admin\AppData\Roaming\Eagles Image Logger.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI29682\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • C:\Users\Admin\AppData\Roaming\Eagles Image Logger.exe

    Filesize

    6.4MB

    MD5

    965fb2fc5db15b030f765e34e2f7cbf9

    SHA1

    84f5d23cf66081cdcba281e93ddc0938741afd93

    SHA256

    c71c4fca850ad63b95858df49395fe31b9cb51efdd95660ab7187ad5432523e8

    SHA512

    75b1879a581d55d5d802eca53f7dbdeb06dbd8078e38264ff4687901fad6675423013c6f7a7359abc168aaa1942202cfc089f7a92ea41fa2d94c69ddb490c601

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    3a524f25cb2a090de939464d673ec3ac

    SHA1

    f721a1a67627d46abb8ffee007ab5cd093e185e1

    SHA256

    995a3b3e0d4db275bc1caadc9e7e03dc2631fcb234c83eb1f76b613e5126963b

    SHA512

    800aa6adac042b2f10abd7b8d73336947cc3e9094b799d9edbbf3c784df3c5c4e6ba3e796b5fe37e50e2d3d14b9f127618924c8d33e6ce88174de6475cb626e3

  • C:\Users\Admin\AppData\Roaming\installer.exe

    Filesize

    85KB

    MD5

    1b18c754c9cccfb1be40b725a7cf9b3e

    SHA1

    2b4bd57ef4d23021ee452b408dcc032aa7f78f07

    SHA256

    dc56aba24508d371ada577ba9af39be2919fd45e94ae04edc43c5c142c2524a9

    SHA512

    73bb18727104a5acfc33e0589c0dcacb046715adbdccbf4e77e79949405cf000cd238fa42c3abe938ee15403c75fb0c71cca8af1e9015db4ca92e9cfcd89ff59

  • memory/1408-59-0x0000000002310000-0x0000000002318000-memory.dmp

    Filesize

    32KB

  • memory/1408-58-0x000000001B680000-0x000000001B962000-memory.dmp

    Filesize

    2.9MB

  • memory/2248-0-0x000007FEF5D13000-0x000007FEF5D14000-memory.dmp

    Filesize

    4KB

  • memory/2248-1-0x00000000008F0000-0x0000000000F82000-memory.dmp

    Filesize

    6.6MB

  • memory/2904-39-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB

  • memory/2904-38-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

    Filesize

    2.9MB

  • memory/3020-33-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-10-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-7-0x0000000000B00000-0x0000000000B1C000-memory.dmp

    Filesize

    112KB

  • memory/3020-75-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB