Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
Resource
win10v2004-20240709-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe
-
Size
551KB
-
MD5
e30e2fe91be631b7bb50916d7b521c29
-
SHA1
7174d5827f6a97e102ed84dc4083a535eb101dc3
-
SHA256
5251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3
-
SHA512
9ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece
-
SSDEEP
12288:/B7jZhysUp6eR1QBNHDt11EpWrcKIx6AB/PX6BPLAzibNv0dY:/xZETp6eoNHDt1mmbroPX6BLoihv0C
Malware Config
Extracted
xworm
3.1
rwanco.duckdns.org:1515
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2620-19-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm behavioral1/memory/2620-21-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm behavioral1/memory/2620-26-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm behavioral1/memory/2620-25-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm behavioral1/memory/2620-24-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2428 powershell.exe 2900 powershell.exe 1140 powershell.exe 2544 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.lnk SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.lnk SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecuriteInfo.com.Win32.PWSX-gen.24441.7577 = "C:\\Users\\Admin\\AppData\\Roaming\\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe" SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2428 powershell.exe 2900 powershell.exe 1140 powershell.exe 2544 powershell.exe 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2428 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 31 PID 2824 wrote to memory of 2428 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 31 PID 2824 wrote to memory of 2428 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 31 PID 2824 wrote to memory of 2428 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 31 PID 2824 wrote to memory of 2584 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 33 PID 2824 wrote to memory of 2584 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 33 PID 2824 wrote to memory of 2584 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 33 PID 2824 wrote to memory of 2584 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 33 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2824 wrote to memory of 2620 2824 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 35 PID 2620 wrote to memory of 2900 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 36 PID 2620 wrote to memory of 2900 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 36 PID 2620 wrote to memory of 2900 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 36 PID 2620 wrote to memory of 2900 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 36 PID 2620 wrote to memory of 1140 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 38 PID 2620 wrote to memory of 1140 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 38 PID 2620 wrote to memory of 1140 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 38 PID 2620 wrote to memory of 1140 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 38 PID 2620 wrote to memory of 2544 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 40 PID 2620 wrote to memory of 2544 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 40 PID 2620 wrote to memory of 2544 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 40 PID 2620 wrote to memory of 2544 2620 SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UhDXQPNrTOujT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UhDXQPNrTOujT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2858.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5159c83c0ad167467cf4386fc66fa9721
SHA1f2ad3ea9273a98c53f3bb5b1bbb18616c04ed00d
SHA2567e3cb325fe50fe8adbc422d7f6624357e6855f1b9a384e5ad56cf9f1379eb706
SHA5127507381c0c5060944181654c343ea4a066b24d4e6623b36a5f1a6a39f1e0e3ca0350b812fe990a7eb461d793ab678db11438092b99b41eb5ab55c70635a1b8b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD518106e5e2963b1c1301b7402f9f3e3f0
SHA1b87f0c7696243a9fd6d2b8d8cbdfee73df0e22d5
SHA256c5d43ee0e8712359e06ff0116c6370d3767f274e7b1dab3cb5c5f89213f635ce
SHA512739acafe48ef970291de7f2547ae135aeaa5a2e69d3da5c828c179f6ec9e62323534bf8b69cd049f996fcc86072bf0593c3fa80433880b617b2ccc8cfed7540a
-
Filesize
551KB
MD5e30e2fe91be631b7bb50916d7b521c29
SHA17174d5827f6a97e102ed84dc4083a535eb101dc3
SHA2565251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3
SHA5129ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece