Analysis
-
max time kernel
13s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 21:41
Behavioral task
behavioral1
Sample
Cleaner.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Cleaner.exe
Resource
win10v2004-20240802-en
General
-
Target
Cleaner.exe
-
Size
172KB
-
MD5
9229077d00bad648e91aaf30bd096567
-
SHA1
83eba361175f6c5dd71f740d527ab853a504d15b
-
SHA256
1eca23db92c0319d414040c2ff9a240d57f806290e1f0238d696fea761c5d948
-
SHA512
a8d6ac08eb8a2d74791238bfd73cda0062ac4a706bba6a61472efd4a062e2e611661a931d0d14a7edd52a833be830c254dbc14b184ae30a013687d547bc105a7
-
SSDEEP
3072:IuAN13vRxKBL+b0kb1zehFjO/G16Bz65/M6If+3Js+3JFkKeTnZ:KRYib0y1ihf16xBt25
Malware Config
Extracted
xworm
127.0.0.1:1990
-
Install_directory
%AppData%
-
install_file
cleaner.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2264-1-0x00000000009D0000-0x0000000000A02000-memory.dmp family_xworm behavioral1/files/0x000c00000001226d-8.dat family_xworm behavioral1/memory/2820-10-0x0000000000110000-0x0000000000142000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cleaner.lnk Cleaner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cleaner.lnk Cleaner.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 cleaner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\cleaner = "C:\\Users\\Admin\\AppData\\Roaming\\cleaner.exe" Cleaner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2264 Cleaner.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2264 Cleaner.exe Token: SeDebugPrivilege 2264 Cleaner.exe Token: SeDebugPrivilege 2820 cleaner.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2264 Cleaner.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1908 2264 Cleaner.exe 30 PID 2264 wrote to memory of 1908 2264 Cleaner.exe 30 PID 2264 wrote to memory of 1908 2264 Cleaner.exe 30 PID 2744 wrote to memory of 2820 2744 taskeng.exe 34 PID 2744 wrote to memory of 2820 2744 taskeng.exe 34 PID 2744 wrote to memory of 2820 2744 taskeng.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\Cleaner.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cleaner" /tr "C:\Users\Admin\AppData\Roaming\cleaner.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3E173A28-74BF-4605-BCF9-6A17AD764469} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\cleaner.exeC:\Users\Admin\AppData\Roaming\cleaner.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD59229077d00bad648e91aaf30bd096567
SHA183eba361175f6c5dd71f740d527ab853a504d15b
SHA2561eca23db92c0319d414040c2ff9a240d57f806290e1f0238d696fea761c5d948
SHA512a8d6ac08eb8a2d74791238bfd73cda0062ac4a706bba6a61472efd4a062e2e611661a931d0d14a7edd52a833be830c254dbc14b184ae30a013687d547bc105a7