Analysis
-
max time kernel
72s -
max time network
78s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
23/07/2024, 18:27
Behavioral task
behavioral1
Sample
Security0.exe
Resource
win10-20240611-en
General
-
Target
Security0.exe
-
Size
10.3MB
-
MD5
9f5720e13e66729b1e685917c46dd186
-
SHA1
28593c013c1508dab2e1238fb4bfad88a5f9b619
-
SHA256
e982016c5ee91104814d98c4fa3f8afbfa21dc7533133e09d7e50e6f64984fc5
-
SHA512
ec2b173db12db307a5af11753b528d4bfd27ec1997c5425b866d4dd27960c6878c75ccd5e0d7eaaa83071aae79659aca462e4720c3b372b530e5d196ab453da5
-
SSDEEP
196608:7GIfbVgEplBHgsX7NTlsSe/HEC+q1gkY4uHnaKjNQh4aj:dbVNAavsS0krq3116N64a
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1840-17-0x00000000777F0000-0x00000000778C0000-memory.dmp family_xworm -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Security0.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1840 powershell.exe 2720 powershell.exe 3832 powershell.exe 4876 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Security0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Security0.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurity.lnk Security0.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurity.lnk Security0.exe -
resource yara_rule behavioral1/memory/3852-11-0x0000000000400000-0x0000000001C30000-memory.dmp themida behavioral1/memory/3852-12-0x0000000000400000-0x0000000001C30000-memory.dmp themida behavioral1/files/0x000700000001ab49-989.dat themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsSecurity = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsSecurity.exe" Security0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Security0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3852 Security0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3852 Security0.exe 3852 Security0.exe 1840 powershell.exe 1840 powershell.exe 1840 powershell.exe 2720 powershell.exe 2720 powershell.exe 2720 powershell.exe 3832 powershell.exe 3832 powershell.exe 3832 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3852 Security0.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 4568 taskmgr.exe Token: SeSystemProfilePrivilege 4568 taskmgr.exe Token: SeCreateGlobalPrivilege 4568 taskmgr.exe Token: SeDebugPrivilege 3852 Security0.exe Token: 33 4568 taskmgr.exe Token: SeIncBasePriorityPrivilege 4568 taskmgr.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe 4568 taskmgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1840 3852 Security0.exe 71 PID 3852 wrote to memory of 1840 3852 Security0.exe 71 PID 3852 wrote to memory of 1840 3852 Security0.exe 71 PID 3852 wrote to memory of 2720 3852 Security0.exe 73 PID 3852 wrote to memory of 2720 3852 Security0.exe 73 PID 3852 wrote to memory of 2720 3852 Security0.exe 73 PID 3852 wrote to memory of 3832 3852 Security0.exe 75 PID 3852 wrote to memory of 3832 3852 Security0.exe 75 PID 3852 wrote to memory of 3832 3852 Security0.exe 75 PID 3852 wrote to memory of 4876 3852 Security0.exe 77 PID 3852 wrote to memory of 4876 3852 Security0.exe 77 PID 3852 wrote to memory of 4876 3852 Security0.exe 77 PID 3852 wrote to memory of 2656 3852 Security0.exe 80 PID 3852 wrote to memory of 2656 3852 Security0.exe 80 PID 3852 wrote to memory of 2656 3852 Security0.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Security0.exe"C:\Users\Admin\AppData\Local\Temp\Security0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Security0.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Security0.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSecurity.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsSecurity" /tr "C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4568
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5f5b7823f01ea09f2e6d741ed81192d3d
SHA1a26b6d6b68d2f1cc26d650f791eabe7190b23427
SHA25641cd68da873446dd8071c28f2c87bfc3ede880026e75e3e518bfb5646a05bc13
SHA5123ee428b41b666f6df20935a21850841182de06b08c14cf7e19086f07d6bce252563bf1b371822a79cfce93a40a5796bdf5181b36804389b7a2a429eff2222d20
-
Filesize
18KB
MD569cfd4c881f567c7ceb0fbf5d456dd9b
SHA136f5341f43d5627940c964ca291e1d9fae954736
SHA256f8294e51dc0e8fbf3de1f817926b99db747f9fa1c584ea1cd66b6bc6de7ac7b7
SHA512431982414c31da3f723a1e6297f9fa6738cf1124f4f67c4c9f3c8f343430ea8e2ff4cf9a85b2227e1373698165a39cc65fd04f99668f0363441950ea82fc0e0d
-
Filesize
18KB
MD57332374be4c3bc256028b443712b558f
SHA1db14e1ed06671a1b69b89196fb01df780c475625
SHA2564f2b4e45db46001a4d85be7832c53a7704e979a0c02879a7fdebb3d73ee55099
SHA512e31782ad8c4624481a6a1e484c3d68b87234352c23641475608eed1bea8fb482e8255c3bbc247205a2dea52b2a44c9f14935c2e2b4cc56d4acc27eeb9a39289c
-
Filesize
24.9MB
MD530748ad61afdac683d8d6289f8c9f9ff
SHA116ca36e8f64b012c309a7a04d3c06ee4bf37419f
SHA2567456131092374469ac26d7b1d901c202ec6cfb87f82703c3136bc78a93a9529e
SHA5123843b4415e0d5fdd5ea45046d8bc7ede26722377a205ead335e4ec3ed8a8766470fd8000662b2e16ea5f473fb41c4a47925dc6a3a1b45f3edb51dfe45cd07f1a
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD59bb94f8d61af936572f37557cc506a05
SHA13919d871b71e64b59445029c10430f27721be200
SHA2567bf5b1deffa5e7986ce63f6b3700189b07ab7e0e6a1664900c87bb5ec91cce11
SHA512542d07216aaae8d49386d2f711f4b74530ac64ba70208aaa17346e700bc1dcebd5c0983516957f3a55ff65024334a9d2e3430ee127743b337491273dd73e1d15