Overview
overview
10Static
static
10topwareBetaV2.zip
windows7-x64
8topwareBetaV2.zip
windows10-2004-x64
1topwareBet...ms.dll
windows7-x64
1topwareBet...ms.dll
windows10-2004-x64
1topwareBet...sk.exe
windows7-x64
5topwareBet...sk.exe
windows10-2004-x64
5topwareBet...in.exe
windows7-x64
10topwareBet...in.exe
windows10-2004-x64
10topwareBet...se.exe
windows7-x64
10topwareBet...se.exe
windows10-2004-x64
10topwareBet...or.dll
windows7-x64
1topwareBet...or.dll
windows10-2004-x64
1topwareBet...in.dll
windows7-x64
1topwareBet...in.dll
windows10-2004-x64
1topwareBet...rt.dll
windows7-x64
1topwareBet...rt.dll
windows10-2004-x64
1topwareBet...ug.exe
windows7-x64
8topwareBet...ug.exe
windows10-2004-x64
8topwareBet...ug.log
windows7-x64
1topwareBet...ug.log
windows10-2004-x64
1topwareBet...on.dll
windows7-x64
1topwareBet...on.dll
windows10-2004-x64
1topwareBet...nt.dll
windows10-2004-x64
3topwareBetaV2/lz4.dll
windows7-x64
1topwareBetaV2/lz4.dll
windows10-2004-x64
1topwareBet...ts.dll
windows7-x64
1topwareBet...ts.dll
windows10-2004-x64
1topwareBet...ect.js
windows7-x64
3topwareBet...ect.js
windows10-2004-x64
3topwareBet...are.py
windows7-x64
3topwareBet...are.py
windows10-2004-x64
3topwareBet...sh.dll
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 14:16
Behavioral task
behavioral1
Sample
topwareBetaV2.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
topwareBetaV2.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
topwareBetaV2/bin/antvms.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
topwareBetaV2/bin/antvms.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
topwareBetaV2/bin/debug/AnyDesk.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
topwareBetaV2/bin/debug/AnyDesk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
topwareBetaV2/bin/debug/debug.main.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
topwareBetaV2/bin/debug/debug.main.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
topwareBetaV2/bin/release/release.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
topwareBetaV2/bin/release/release.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
topwareBetaV2/bin/trafficencryptor.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
topwareBetaV2/bin/trafficencryptor.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
topwareBetaV2/bin/xfcmain.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
topwareBetaV2/bin/xfcmain.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
topwareBetaV2/bin/xfcstart.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
topwareBetaV2/bin/xfcstart.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
topwareBetaV2/debug.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
topwareBetaV2/debug.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
topwareBetaV2/debug.log
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
topwareBetaV2/debug.log
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
topwareBetaV2/execution.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
topwareBetaV2/execution.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
topwareBetaV2/injectprint.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
topwareBetaV2/lz4.dll
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
topwareBetaV2/lz4.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
topwareBetaV2/offsets.dll
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
topwareBetaV2/offsets.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
topwareBetaV2/topware.inject.js
Resource
win7-20240705-en
Behavioral task
behavioral29
Sample
topwareBetaV2/topware.inject.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral30
Sample
topwareBetaV2/topware.py
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
topwareBetaV2/topware.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
topwareBetaV2/xxhash.dll
Resource
win7-20240705-en
General
-
Target
topwareBetaV2/bin/release/release.exe
-
Size
64KB
-
MD5
36969de6b4bf8de24684de1bb71f624f
-
SHA1
0327d7d9d7f739e4b09bab680249ed997a281c9b
-
SHA256
57035572212814c4666994f1a0d2b6955b0951a8f1e9e1686dead895de5f64cf
-
SHA512
cd8eae1b19c8ae9a2d22b999e85e86625a1e74630e6f3155ff63965b8f116e62f79dcc23b88c92f51fa42ee26f7bd87cad22a21f32f16306890576e309dfe548
-
SSDEEP
1536:TTodvW06WoBsscJSbigiYUVkaNW6PmqCO26erLq:UenWissBbigHmkaRmHO26erLq
Malware Config
Extracted
xworm
79.110.49.233:4444
-
Install_directory
%AppData%
-
install_file
VSREDIST.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral9/memory/2980-1-0x0000000000C20000-0x0000000000C36000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2788 powershell.exe 2600 powershell.exe 1192 powershell.exe 3004 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSREDIST.lnk release.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSREDIST.lnk release.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VSREDIST = "C:\\Users\\Admin\\AppData\\Roaming\\VSREDIST.exe" release.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2788 powershell.exe 2600 powershell.exe 1192 powershell.exe 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2980 release.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 2980 release.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2788 2980 release.exe 31 PID 2980 wrote to memory of 2788 2980 release.exe 31 PID 2980 wrote to memory of 2788 2980 release.exe 31 PID 2980 wrote to memory of 2600 2980 release.exe 33 PID 2980 wrote to memory of 2600 2980 release.exe 33 PID 2980 wrote to memory of 2600 2980 release.exe 33 PID 2980 wrote to memory of 1192 2980 release.exe 35 PID 2980 wrote to memory of 1192 2980 release.exe 35 PID 2980 wrote to memory of 1192 2980 release.exe 35 PID 2980 wrote to memory of 3004 2980 release.exe 37 PID 2980 wrote to memory of 3004 2980 release.exe 37 PID 2980 wrote to memory of 3004 2980 release.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\topwareBetaV2\bin\release\release.exe"C:\Users\Admin\AppData\Local\Temp\topwareBetaV2\bin\release\release.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\topwareBetaV2\bin\release\release.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'release.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\VSREDIST.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VSREDIST.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a25cd1916a3d7ccffacbaa38ca36e9f3
SHA1e5e33ea69b5f4a2e7f594ae453c81ac024cd0447
SHA256fef87c776c64ca79f92d40a863d35a46ddd71302fdd0d7a041b194becba292ce
SHA5125e6e5affd0023e17f90f2d2f307f6779741d50356ba6f026207844b301538e73147ddf861b3a2208b3eb5611750b699d52300f484bfde009f14cc432ba7e551c