Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 16:11

General

  • Target

    64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe

  • Size

    7.7MB

  • MD5

    6ca08efccb785d2b8c23c54a05930356

  • SHA1

    c4de56535545a5a6555af998b2b3fbb254637625

  • SHA256

    64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed

  • SHA512

    8da14f29989d5c99b0335be45951e4e87dccabefccae73a8e5cf13d91e6d47fcf1408b9020a965015b15175239f6d732d8cd4b6b11e07b232386827984b77b14

  • SSDEEP

    196608:p9xmKlBELQL73HTSddEVnvbG3eVvMJxOf2X6QDpTrTMA:Yf03QdEc3eJMJxOf25VT3D

Malware Config

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1255561908631900262/FBfFOJC5RNZ6gSVwbGsinrWT1Tk0AcX2fxXrs9EMYvCvgKrDx5R4TOUhy9LGN7mz_JKs

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

147.185.221.20:49236

Mutex

6a8a3b6e5450a823d542e748a454aa4c

Attributes
  • reg_key

    6a8a3b6e5450a823d542e748a454aa4c

  • splitter

    |'|'|

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 4 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe
    "C:\Users\Admin\AppData\Local\Temp\64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Users\Admin\AppData\Roaming\Server.exe
        "C:\Users\Admin\AppData\Roaming\Server.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1596
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:2692
      • C:\Users\Admin\AppData\Roaming\conhost.exe
        "C:\Users\Admin\AppData\Roaming\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2276
    • C:\Users\Admin\AppData\Local\Temp\3.exe
      "C:\Users\Admin\AppData\Local\Temp\3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Users\Admin\AppData\Roaming\3.exe
        "C:\Users\Admin\AppData\Roaming\3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2520
        • C:\Windows\system32\attrib.exe
          "attrib.exe" +h +s "C:\Users\Admin\AppData\Roaming\3.exe"
          4⤵
          • Views/modifies file attributes
          PID:1328
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\3.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2924
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2252
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" os get Caption
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3028
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" computersystem get totalphysicalmemory
          4⤵
            PID:2080
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" csproduct get uuid
            4⤵
              PID:2812
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2880
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic" path win32_VideoController get name
              4⤵
              • Detects videocard installed
              PID:1972
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Roaming\3.exe" && pause
              4⤵
                PID:2788
                • C:\Windows\system32\PING.EXE
                  ping localhost
                  5⤵
                  • Runs ping.exe
                  PID:2016
            • C:\Users\Admin\AppData\Roaming\conhost.exe
              "C:\Users\Admin\AppData\Roaming\conhost.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2744
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2036
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:572
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:960
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2348
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2068
          • C:\Users\Admin\AppData\Local\Temp\msxml6.EXE
            "C:\Users\Admin\AppData\Local\Temp\msxml6.EXE"
            2⤵
            • Executes dropped EXE
            PID:2840
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {6EC83B88-1A77-48E9-A2B9-2CA68F99B8C2} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
          1⤵
            PID:2396
            • C:\Users\Admin\AppData\Roaming\Ondrive.exe
              C:\Users\Admin\AppData\Roaming\Ondrive.exe
              2⤵
              • Executes dropped EXE
              PID:1964
            • C:\Users\Admin\AppData\Roaming\Ondrive.exe
              C:\Users\Admin\AppData\Roaming\Ondrive.exe
              2⤵
              • Executes dropped EXE
              PID:1688

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\3.exe

            Filesize

            274KB

            MD5

            ed59c6590b199b2ee53eec444322472b

            SHA1

            6c91f4e2489a9869ab971061fdd67a0eeb1e7007

            SHA256

            aa4abbb1305525b1703a23521db1e817dfd39f014527c319a16a153d2d9dcb0f

            SHA512

            7dd903995d2c673a3778c5f4f5006cdf3e177ad9093649e5e953894e49f386049ae1e58103095874f09b91d4e21d963d05f02ea9644ed67dd3054aa10b47ba97

          • C:\Users\Admin\AppData\Local\Temp\Server.exe

            Filesize

            71KB

            MD5

            f9b08bd21b40a938122b479095b7c70c

            SHA1

            eb925e3927b83c20d8d24bdab2e587c10d6ac8cd

            SHA256

            c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8

            SHA512

            fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee

          • C:\Users\Admin\AppData\Roaming\3.exe

            Filesize

            227KB

            MD5

            66d7e8125484efe9585adf807f3860ec

            SHA1

            aad54a84cc6bfcd422631bfce7b187b001ec0128

            SHA256

            9cc7b63b2a2c95cfdd1f0f9044f6f760d8dae0d622aa07cb18ce071d9c491d4e

            SHA512

            f0eabf14bab037689568dc6f7bb6126d1c5922e08432b650e338567c7ae2d70d1ac3420dfec0501453a0e8fece11482071434137e70d62e1136dd482a791d5d5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            4b44d6a9b4157f7e5c708027e8cf5f03

            SHA1

            90a97073b014839b7301ffed9354cdba378d0bec

            SHA256

            f97f709534e5ddee9e2d277041059685f562fa1da7b4ef82711aa8d5d2ce3ec3

            SHA512

            20f972d6126e7ae251926404e871a73ef71e4eeed6c6ca2d8b431a61e1b0fb502a0f7d9ff8666c0bacea8cda97bd2494038b069a790fc4ad72051be7b21425c2

          • C:\Users\Admin\AppData\Roaming\Server.exe

            Filesize

            23KB

            MD5

            32fe01ccb93b0233503d0aaaa451f7b2

            SHA1

            58e5a63142150e8fb175dbb4dedea2ce405d7db0

            SHA256

            6988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43

            SHA512

            76945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6

          • C:\Users\Admin\AppData\Roaming\conhost.exe

            Filesize

            37KB

            MD5

            b37dd1a1f0507baf993471ae1b7a314c

            SHA1

            9aff9d71492ffff8d51f8e8d67f5770755899882

            SHA256

            e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc

            SHA512

            ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460

          • \Users\Admin\AppData\Local\Temp\msxml6.EXE

            Filesize

            7.7MB

            MD5

            8b39a0c9d351c316ae38251db3e917da

            SHA1

            71c988393af62584e93ebe721a600c1a51fa7c29

            SHA256

            aacbefe172556a5df9e5bf52834aaa22893002edeb46533e1a85866cc7462a15

            SHA512

            092f06c5f373a65be4f4784357596422df1bb50dcd81c0056464c70f99a0845d71e6819f01c8e7a2ca3f663ad4125588b6e48d88ec0736e7305a70bd8c59e9af

          • memory/1428-47-0x000000001B240000-0x000000001B522000-memory.dmp

            Filesize

            2.9MB

          • memory/1428-48-0x00000000023F0000-0x00000000023F8000-memory.dmp

            Filesize

            32KB

          • memory/1688-119-0x00000000012E0000-0x00000000012F0000-memory.dmp

            Filesize

            64KB

          • memory/1964-117-0x0000000001040000-0x0000000001050000-memory.dmp

            Filesize

            64KB

          • memory/2548-0-0x000007FEF6533000-0x000007FEF6534000-memory.dmp

            Filesize

            4KB

          • memory/2548-35-0x000007FEF6530000-0x000007FEF6F1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2548-1-0x0000000000010000-0x00000000007D0000-memory.dmp

            Filesize

            7.8MB

          • memory/2548-2-0x000007FEF6530000-0x000007FEF6F1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2744-40-0x0000000000180000-0x0000000000190000-memory.dmp

            Filesize

            64KB

          • memory/2764-14-0x00000000003A0000-0x00000000003EA000-memory.dmp

            Filesize

            296KB

          • memory/2772-29-0x0000000001270000-0x00000000012B0000-memory.dmp

            Filesize

            256KB

          • memory/2856-42-0x000007FEF6530000-0x000007FEF6F1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2856-18-0x000007FEF6530000-0x000007FEF6F1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2856-11-0x0000000000960000-0x0000000000978000-memory.dmp

            Filesize

            96KB

          • memory/2880-109-0x0000000002560000-0x0000000002568000-memory.dmp

            Filesize

            32KB

          • memory/2924-54-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

            Filesize

            2.9MB

          • memory/2924-55-0x0000000002020000-0x0000000002028000-memory.dmp

            Filesize

            32KB