Resubmissions
02/02/2025, 22:41
250202-2mj4sssqfj 1014/08/2024, 11:34
240814-npp6yavbpl 1024/07/2024, 18:34
240724-w7q5ys1cmr 1024/07/2024, 18:33
240724-w7ag7stere 1024/07/2024, 18:31
240724-w6jdqa1bqp 1024/07/2024, 18:30
240724-w5zdjs1bnm 1024/07/2024, 18:30
240724-w5j9matejg 1024/07/2024, 18:29
240724-w44lwatdqd 1024/07/2024, 18:28
240724-w4nknatdpa 1024/07/2024, 18:27
240724-w38t7s1apm 10Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 18:27
Behavioral task
behavioral1
Sample
писька чит.exe
Resource
win7-20240704-en
Errors
General
-
Target
писька чит.exe
-
Size
71KB
-
MD5
ed3794861ddc34b4748ff8081e80cb2b
-
SHA1
e63cf084552f0c2803de0109e3d2fcd3102c4738
-
SHA256
6af19a694c8c3e6860d2555ce16be115c599c3424ec1e01c0bf67acd3298ae0f
-
SHA512
df771b8eecb7e065628c06b8cca9aa7df6dd05bbdba0f85ed34010e264a286a17129289d6ac3e9f87c56152ed7a35302e88ae6643a1bb06c45745cf3d5ea0b03
-
SSDEEP
1536:EYB+O1NIBlJ4wlA0B4GI0b0xEPdB8QlOrIXt6fT+S1va+OuPyGV54:EOgQwlRB4wb0xEFBdMIk+S19OuaGV54
Malware Config
Extracted
xworm
main-although.gl.at.ply.gg:30970
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2472-1-0x0000000000110000-0x0000000000128000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2932 powershell.exe 2620 powershell.exe 2600 powershell.exe 2412 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk писька чит.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk писька чит.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2620 powershell.exe 2600 powershell.exe 2412 powershell.exe 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2472 писька чит.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 2472 писька чит.exe Token: SeShutdownPrivilege 1700 shutdown.exe Token: SeRemoteShutdownPrivilege 1700 shutdown.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2620 2472 писька чит.exe 31 PID 2472 wrote to memory of 2620 2472 писька чит.exe 31 PID 2472 wrote to memory of 2620 2472 писька чит.exe 31 PID 2472 wrote to memory of 2600 2472 писька чит.exe 33 PID 2472 wrote to memory of 2600 2472 писька чит.exe 33 PID 2472 wrote to memory of 2600 2472 писька чит.exe 33 PID 2472 wrote to memory of 2412 2472 писька чит.exe 35 PID 2472 wrote to memory of 2412 2472 писька чит.exe 35 PID 2472 wrote to memory of 2412 2472 писька чит.exe 35 PID 2472 wrote to memory of 2932 2472 писька чит.exe 37 PID 2472 wrote to memory of 2932 2472 писька чит.exe 37 PID 2472 wrote to memory of 2932 2472 писька чит.exe 37 PID 2472 wrote to memory of 1700 2472 писька чит.exe 39 PID 2472 wrote to memory of 1700 2472 писька чит.exe 39 PID 2472 wrote to memory of 1700 2472 писька чит.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\писька чит.exe"C:\Users\Admin\AppData\Local\Temp\писька чит.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\писька чит.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'писька чит.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2432
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ae78f2ecad7eaa0237af87c40f43e9d8
SHA197954734fa6dba790f0eae4044b2d99facb917ad
SHA256512996de1ab53a59d3059e878f3048c118d25541f3d8e2ea8cf6780997ac0f9b
SHA5129c7dac2d623094f7be4f9065b4410ed3befdf1f6744e50c62950e15f7eeeb6c2c0c4c7f1f4da488baefedb8eb67bdff62544f375cbd790b6998b59b09faf4c76