Analysis

  • max time kernel
    48s
  • max time network
    47s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 15:40

General

  • Target

    XWorm.exe

  • Size

    456KB

  • MD5

    515a0c8be21a5ba836e5687fc2d73333

  • SHA1

    c52be9d0d37ac1b8d6bc09860e68e9e0615255ab

  • SHA256

    9950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae

  • SHA512

    4e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522

  • SSDEEP

    6144:2uWP/BtSnurUylcrGYlnIttxv8HbcLgsd1Gus5psdrvV44dixP+MHDkBYdxtG9+V:2uWP/BZUyoLu8Agsmxwrvejkd2

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XWorm.exe
    "C:\Users\Admin\AppData\Local\Temp\XWorm.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4464
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.0.750556129\918930118" -parentBuildID 20230214051806 -prefsHandle 1776 -prefMapHandle 1768 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e1fd8e8-73e4-4278-ad9c-175e01db1329} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 1868 2259b70d458 gpu
        3⤵
          PID:1588
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.1.749533236\947780033" -parentBuildID 20230214051806 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 22112 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c45a115d-70fa-4473-8aef-58e92924740c} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 2436 2258e989058 socket
          3⤵
          • Checks processor information in registry
          PID:4088
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.2.89039972\1924608757" -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3008 -prefsLen 22150 -prefMapSize 235121 -jsInitHandle 1288 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0da0895-39e6-44cf-a06a-09bbfd9f2e99} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 3024 2259dfe5b58 tab
          3⤵
            PID:3696
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.3.1941230983\1319138961" -childID 2 -isForBrowser -prefsHandle 4216 -prefMapHandle 4212 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1288 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1426-0993-4077-8188-73840209f89f} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 4228 225a0b85258 tab
            3⤵
              PID:456
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.4.1974113791\240704970" -childID 3 -isForBrowser -prefsHandle 5024 -prefMapHandle 5048 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1288 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {187ec02a-0f99-4922-96e8-3b8a2c3ca7ae} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 5060 225a2d95558 tab
              3⤵
                PID:4924
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.5.1423814188\450619804" -childID 4 -isForBrowser -prefsHandle 5244 -prefMapHandle 5240 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1288 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c53a2477-4c3a-4290-a22a-35b4a905d482} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 5252 225a2d94f58 tab
                3⤵
                  PID:4940
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3036.6.864052172\1688811579" -childID 5 -isForBrowser -prefsHandle 5148 -prefMapHandle 5152 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1288 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30c4bba2-08c5-43fa-b25b-5a8ace1ae0d5} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" 5140 225a2d92b58 tab
                  3⤵
                    PID:3944
              • C:\Windows\system32\taskmgr.exe
                "C:\Windows\system32\taskmgr.exe" /4
                1⤵
                • Checks SCSI registry key(s)
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:468
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:2280
                • C:\Windows\System32\rpvymf.exe
                  "C:\Windows\System32\rpvymf.exe"
                  1⤵
                    PID:1892

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\e6zhegwu.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    26KB

                    MD5

                    f1b2f25b01ffa7cfadf7134fbecb0ec6

                    SHA1

                    53a5604ce68b4ef3ba3760318555c14ea7fdea84

                    SHA256

                    d32fb35d95b092fe826f2554c02c2e04f38c48f30f8822595d14f9e082b244dd

                    SHA512

                    21dd1fd890538d8c38172282fb9a68139edc9d58584a590bdef89f9a5db07809c3fc941d2ac0746b1a6df3c8413cc199cdf98529b114e434399667e6828e52e5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    a36b76bca41910c3575674f693ca1109

                    SHA1

                    8d71e459f9e7497ad99a70f0f2baaaddff44b865

                    SHA256

                    df4012d2c9892151ead1f59fdab0b7119ada15282adf65a728cb9677e4465c4d

                    SHA512

                    de7019dbb2ce9bed30f09809d5a02b787dbfc9eda8aebf49b84f46e677bbaefd2ae5916ffbb5f969fe29f1b03e27f8e2cc097cceaae2b96bb9d1c187ed39bd4e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\sessionstore.jsonlz4

                    Filesize

                    923B

                    MD5

                    956281913d3f732a5badd4622dceba8e

                    SHA1

                    bfe2532a2d6b2ddd432707fb9d84cb1707b2d3b3

                    SHA256

                    5dad8af635e223af5f3ca8e1915e35035b6c0e7d88b65495a730de19c951cc0b

                    SHA512

                    be428a75c5fb9d2356ab17d929a9c95afdcb7b041b50e8a1215c8e6f56147d96a3d7c0ae165f1b6e7c1e84e04fe8b78fa74615da8aef58f344d4a8b3bdebb4d9

                  • memory/468-121-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-120-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-116-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-115-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-118-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-109-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-111-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-110-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-117-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/468-119-0x0000018D99B30000-0x0000018D99B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/4464-4-0x00000000025A0000-0x00000000029A0000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4464-0-0x0000000000740000-0x0000000000747000-memory.dmp

                    Filesize

                    28KB

                  • memory/4464-1-0x00000000025A0000-0x00000000029A0000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4464-2-0x00000000025A0000-0x00000000029A0000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4464-3-0x00000000025A0000-0x00000000029A0000-memory.dmp

                    Filesize

                    4.0MB