Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
GPU-UUID-Changer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GPU-UUID-Changer.exe
Resource
win10v2004-20240709-en
General
-
Target
GPU-UUID-Changer.exe
-
Size
9.1MB
-
MD5
3f6c9384490a5eb88d9c6a1b258a9895
-
SHA1
403e28d2656ed756ea0e8cb29dc2651820b3f208
-
SHA256
935996d08fff589672a9b02b6b95378af257416620f289af520602136dcba3d2
-
SHA512
2980ece94859d2c09cd03367e430ddf73a905c83598ed3b0f4cce6fa7b5b6a6e470221b6419b88def3a17d4702397a4f748406500e7bc3381efeab7ed7980aca
-
SSDEEP
196608:3gJCvHuEdmzjKiQLYAsGcBzG5NF1TvdS7gW:ECPueiQxsANF1vdS7h
Malware Config
Extracted
xworm
3.1
aid-poly.at.ply.gg:13632
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023419-6.dat family_xworm behavioral2/memory/1708-13-0x00000000009F0000-0x0000000000A08000-memory.dmp family_xworm -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation GPU-UUID-Changer.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation spoof.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spoof.lnk spoof.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spoof.lnk spoof.exe -
Executes dropped EXE 4 IoCs
pid Process 1708 spoof.exe 1260 GPU-UUID-Changer.exe 1384 spoof.exe 2820 spoof.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoof = "C:\\Users\\Admin\\AppData\\Local\\Temp\\spoof.exe" spoof.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\1\DiskPeripheral GPU-UUID-Changer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\2\DiskPeripheral GPU-UUID-Changer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0KeyboardController\0KeyboardPeripheral\0 GPU-UUID-Changer.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral GPU-UUID-Changer.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral GPU-UUID-Changer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 GPU-UUID-Changer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier GPU-UUID-Changer.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "e0df3c7e-bb980fd1-f" GPU-UUID-Changer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral GPU-UUID-Changer.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3024 vssadmin.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1260 GPU-UUID-Changer.exe 1260 GPU-UUID-Changer.exe 1260 GPU-UUID-Changer.exe 1260 GPU-UUID-Changer.exe 1708 spoof.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1708 spoof.exe Token: SeBackupPrivilege 1312 vssvc.exe Token: SeRestorePrivilege 1312 vssvc.exe Token: SeAuditPrivilege 1312 vssvc.exe Token: SeAssignPrimaryTokenPrivilege 1484 svchost.exe Token: SeIncreaseQuotaPrivilege 1484 svchost.exe Token: SeSecurityPrivilege 1484 svchost.exe Token: SeTakeOwnershipPrivilege 1484 svchost.exe Token: SeLoadDriverPrivilege 1484 svchost.exe Token: SeSystemtimePrivilege 1484 svchost.exe Token: SeBackupPrivilege 1484 svchost.exe Token: SeRestorePrivilege 1484 svchost.exe Token: SeShutdownPrivilege 1484 svchost.exe Token: SeSystemEnvironmentPrivilege 1484 svchost.exe Token: SeUndockPrivilege 1484 svchost.exe Token: SeManageVolumePrivilege 1484 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1484 svchost.exe Token: SeIncreaseQuotaPrivilege 1484 svchost.exe Token: SeSecurityPrivilege 1484 svchost.exe Token: SeTakeOwnershipPrivilege 1484 svchost.exe Token: SeLoadDriverPrivilege 1484 svchost.exe Token: SeSystemtimePrivilege 1484 svchost.exe Token: SeBackupPrivilege 1484 svchost.exe Token: SeRestorePrivilege 1484 svchost.exe Token: SeShutdownPrivilege 1484 svchost.exe Token: SeSystemEnvironmentPrivilege 1484 svchost.exe Token: SeUndockPrivilege 1484 svchost.exe Token: SeManageVolumePrivilege 1484 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1484 svchost.exe Token: SeIncreaseQuotaPrivilege 1484 svchost.exe Token: SeSecurityPrivilege 1484 svchost.exe Token: SeTakeOwnershipPrivilege 1484 svchost.exe Token: SeLoadDriverPrivilege 1484 svchost.exe Token: SeSystemtimePrivilege 1484 svchost.exe Token: SeBackupPrivilege 1484 svchost.exe Token: SeRestorePrivilege 1484 svchost.exe Token: SeShutdownPrivilege 1484 svchost.exe Token: SeSystemEnvironmentPrivilege 1484 svchost.exe Token: SeUndockPrivilege 1484 svchost.exe Token: SeManageVolumePrivilege 1484 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1484 svchost.exe Token: SeIncreaseQuotaPrivilege 1484 svchost.exe Token: SeSecurityPrivilege 1484 svchost.exe Token: SeTakeOwnershipPrivilege 1484 svchost.exe Token: SeLoadDriverPrivilege 1484 svchost.exe Token: SeSystemtimePrivilege 1484 svchost.exe Token: SeBackupPrivilege 1484 svchost.exe Token: SeRestorePrivilege 1484 svchost.exe Token: SeShutdownPrivilege 1484 svchost.exe Token: SeSystemEnvironmentPrivilege 1484 svchost.exe Token: SeUndockPrivilege 1484 svchost.exe Token: SeManageVolumePrivilege 1484 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1484 svchost.exe Token: SeIncreaseQuotaPrivilege 1484 svchost.exe Token: SeSecurityPrivilege 1484 svchost.exe Token: SeTakeOwnershipPrivilege 1484 svchost.exe Token: SeLoadDriverPrivilege 1484 svchost.exe Token: SeSystemtimePrivilege 1484 svchost.exe Token: SeBackupPrivilege 1484 svchost.exe Token: SeRestorePrivilege 1484 svchost.exe Token: SeShutdownPrivilege 1484 svchost.exe Token: SeSystemEnvironmentPrivilege 1484 svchost.exe Token: SeUndockPrivilege 1484 svchost.exe Token: SeManageVolumePrivilege 1484 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 spoof.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1708 1336 GPU-UUID-Changer.exe 86 PID 1336 wrote to memory of 1708 1336 GPU-UUID-Changer.exe 86 PID 1336 wrote to memory of 1260 1336 GPU-UUID-Changer.exe 87 PID 1336 wrote to memory of 1260 1336 GPU-UUID-Changer.exe 87 PID 1260 wrote to memory of 3728 1260 GPU-UUID-Changer.exe 89 PID 1260 wrote to memory of 3728 1260 GPU-UUID-Changer.exe 89 PID 3728 wrote to memory of 3024 3728 cmd.exe 90 PID 3728 wrote to memory of 3024 3728 cmd.exe 90 PID 1260 wrote to memory of 1880 1260 GPU-UUID-Changer.exe 93 PID 1260 wrote to memory of 1880 1260 GPU-UUID-Changer.exe 93 PID 1880 wrote to memory of 2408 1880 cmd.exe 94 PID 1880 wrote to memory of 2408 1880 cmd.exe 94 PID 2408 wrote to memory of 5012 2408 net.exe 95 PID 2408 wrote to memory of 5012 2408 net.exe 95 PID 1708 wrote to memory of 2612 1708 spoof.exe 99 PID 1708 wrote to memory of 2612 1708 spoof.exe 99 PID 1260 wrote to memory of 3104 1260 GPU-UUID-Changer.exe 101 PID 1260 wrote to memory of 3104 1260 GPU-UUID-Changer.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GPU-UUID-Changer.exe"C:\Users\Admin\AppData\Local\Temp\GPU-UUID-Changer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\spoof.exe"C:\Users\Admin\AppData\Roaming\spoof.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "spoof" /tr "C:\Users\Admin\AppData\Local\Temp\spoof.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2612
-
-
-
C:\Users\Admin\AppData\Roaming\GPU-UUID-Changer.exe"C:\Users\Admin\AppData\Roaming\GPU-UUID-Changer.exe"2⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin delete shadows /All /Quiet3⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:3024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop winmgmt /Y3⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\net.exenet stop winmgmt /Y4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /Y5⤵PID:5012
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit3⤵PID:3104
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
C:\Users\Admin\AppData\Local\Temp\spoof.exeC:\Users\Admin\AppData\Local\Temp\spoof.exe1⤵
- Executes dropped EXE
PID:1384
-
C:\Users\Admin\AppData\Local\Temp\spoof.exeC:\Users\Admin\AppData\Local\Temp\spoof.exe1⤵
- Executes dropped EXE
PID:2820
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
9.1MB
MD5d017dce19ccb6058d97506dcea7a8d8e
SHA1c2789af6e67fb530b64da82ced1355f4494ff1bd
SHA256b4a5ac199048621eef42ad480aa9379a6ac76dbae08ca4b170da9e970b48e059
SHA51204d504f551ab762b69174c01dfec82611a43125aea670d7070162268542b3dd95c519bc93e51e8490c122c834a87a85c76fed3c2bea601742b951713624405c3
-
Filesize
68KB
MD53e1a0d74fd0db1063ca1497041470a32
SHA1932b8d0954102add2461cf203ccb96a35b1ddef7
SHA2561c655e32a859ce3fe86a6e9ebb810c4e848bebd2f83db91af991771639df76b6
SHA512561e53db8bec69f6bb9029ba7a245067305ffcfc133a53b3b68c4d5d3f7b9acc71db60afff9f2e3fdfbb55e50ede13362fb2b2e8897b89f36f7543da9cc144cf