General
-
Target
1111.txt
-
Size
40B
-
Sample
240711-e2wd2sygkl
-
MD5
1424606dbfeb39f90c1465f60bae2db2
-
SHA1
cf47c1441422f20f0c03ec05a88d1c9062518ec9
-
SHA256
c88ffa55d1136e9393fa642c508ab09e91da603eb036c0ca72fb77d806844c14
-
SHA512
6fa4d908ad553ab25ba461393baadd9b99d2134b05059b61ba80582551d8b517ff8cdfde010f48e652b8ab16034371b935717afcda5833cab4b63d31c6368635
Static task
static1
Behavioral task
behavioral1
Sample
1111.txt
Resource
win7-20240708-en
Malware Config
Extracted
xworm
connection-arizona.gl.at.ply.gg:65211
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
1111.txt
-
Size
40B
-
MD5
1424606dbfeb39f90c1465f60bae2db2
-
SHA1
cf47c1441422f20f0c03ec05a88d1c9062518ec9
-
SHA256
c88ffa55d1136e9393fa642c508ab09e91da603eb036c0ca72fb77d806844c14
-
SHA512
6fa4d908ad553ab25ba461393baadd9b99d2134b05059b61ba80582551d8b517ff8cdfde010f48e652b8ab16034371b935717afcda5833cab4b63d31c6368635
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1