Overview
overview
10Static
static
10Anarchy Pa...ed.rar
windows7-x64
3Anarchy Pa...ed.rar
windows10-2004-x64
3Anarchy Pa...er.exe
windows7-x64
10Anarchy Pa...er.exe
windows10-2004-x64
10Anarchy Pa...xe.xml
windows7-x64
3Anarchy Pa...xe.xml
windows10-2004-x64
1Anarchy Pa...oG.dll
windows7-x64
1Anarchy Pa...oG.dll
windows10-2004-x64
1Anarchy Pa...uJ.dll
windows7-x64
1Anarchy Pa...uJ.dll
windows10-2004-x64
1Anarchy Pa...qM.dll
windows7-x64
1Anarchy Pa...qM.dll
windows10-2004-x64
1Anarchy Pa...LC.dll
windows7-x64
1Anarchy Pa...LC.dll
windows10-2004-x64
1Anarchy Pa...wp.dll
windows7-x64
1Anarchy Pa...wp.dll
windows10-2004-x64
1Anarchy Pa...uZ.dll
windows7-x64
1Anarchy Pa...uZ.dll
windows10-2004-x64
1Anarchy Pa...nG.dll
windows7-x64
1Anarchy Pa...nG.dll
windows10-2004-x64
1Anarchy Pa...TS.dll
windows7-x64
1Anarchy Pa...TS.dll
windows10-2004-x64
1Anarchy Pa...xj.dll
windows7-x64
1Anarchy Pa...xj.dll
windows10-2004-x64
1Anarchy Pa...pi.dll
windows7-x64
1Anarchy Pa...pi.dll
windows10-2004-x64
1Anarchy Pa...s4.dll
windows7-x64
1Anarchy Pa...s4.dll
windows10-2004-x64
1Anarchy Pa...Ya.dll
windows7-x64
1Anarchy Pa...Ya.dll
windows10-2004-x64
1Anarchy Pa...Jn.dll
windows7-x64
1Anarchy Pa...Jn.dll
windows10-2004-x64
1Analysis
-
max time kernel
579s -
max time network
599s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 08:08
Behavioral task
behavioral1
Sample
Anarchy Panel Leaked.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Anarchy Panel Leaked.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Anarchy Panel Leaked/Anarchy Loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Anarchy Panel Leaked/Anarchy Loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Anarchy Panel Leaked/Anarchy Panel.exe.xml
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Anarchy Panel Leaked/Anarchy Panel.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Anarchy Panel Leaked/Plugins/0guo3zbo66fqoG.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Anarchy Panel Leaked/Plugins/0guo3zbo66fqoG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Anarchy Panel Leaked/Plugins/59Zp7paEHDF7luJ.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Anarchy Panel Leaked/Plugins/59Zp7paEHDF7luJ.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Anarchy Panel Leaked/Plugins/CjETR6GpGXqM.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Anarchy Panel Leaked/Plugins/CjETR6GpGXqM.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Anarchy Panel Leaked/Plugins/EVa7gBMKoaHmLC.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Anarchy Panel Leaked/Plugins/EVa7gBMKoaHmLC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Anarchy Panel Leaked/Plugins/FBSyChwp.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Anarchy Panel Leaked/Plugins/FBSyChwp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Anarchy Panel Leaked/Plugins/G3nl0mDcABnDuZ.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Anarchy Panel Leaked/Plugins/G3nl0mDcABnDuZ.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Anarchy Panel Leaked/Plugins/KNTmoSnG.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Anarchy Panel Leaked/Plugins/KNTmoSnG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Anarchy Panel Leaked/Plugins/PK0TcnqTGFagQTS.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Anarchy Panel Leaked/Plugins/PK0TcnqTGFagQTS.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Anarchy Panel Leaked/Plugins/RssCnLKcGRxj.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Anarchy Panel Leaked/Plugins/RssCnLKcGRxj.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Anarchy Panel Leaked/Plugins/WkUP83aP9CABpi.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Anarchy Panel Leaked/Plugins/WkUP83aP9CABpi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Anarchy Panel Leaked/Plugins/eMTYbTz0gueNs4.dll
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
Anarchy Panel Leaked/Plugins/eMTYbTz0gueNs4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Anarchy Panel Leaked/Plugins/fzAgyDYa.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Anarchy Panel Leaked/Plugins/fzAgyDYa.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Anarchy Panel Leaked/Plugins/mGWHaG2Jn.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Anarchy Panel Leaked/Plugins/mGWHaG2Jn.dll
Resource
win10v2004-20240802-en
General
-
Target
Anarchy Panel Leaked/Anarchy Loader.exe
-
Size
54.7MB
-
MD5
5016491d1b400d431bf64bdfaa2402f2
-
SHA1
87c7f677cdbebefdedc3d7d975c2bb4f7725412a
-
SHA256
98b14faa7577d52999942de580275ecd78ef3f1e236ab52f646ceb562fce07ad
-
SHA512
cad0fd505e07b81540408a71e311e2e23f305a7508859d411a7b1d8d1a90547c264da4cf25c39fb0a1f33070f51bfafb42265be64affe9c4f07e61c4411d98d6
-
SSDEEP
1572864:r7s7RAkmum9Dio4y92UGp1DUMSoZ4XisCTK+OhiO0iQOCL:rI79hm9D54yAUs1DUBh3CTjOqiQO
Malware Config
Extracted
xworm
209.25.141.181:31533
-
Install_directory
%Temp%
-
install_file
INCCHECK.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\AnarchyInstall.exe family_xworm behavioral3/memory/2160-7-0x0000000000970000-0x000000000098E000-memory.dmp family_xworm -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral3/memory/2096-21-0x0000000000F90000-0x000000000462E000-memory.dmp net_reactor -
Drops startup file 2 IoCs
Processes:
AnarchyInstall.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\INCCHECK.lnk AnarchyInstall.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\INCCHECK.lnk AnarchyInstall.exe -
Executes dropped EXE 2 IoCs
Processes:
AnarchyInstall.exeAnarchy Panel.exepid process 2160 AnarchyInstall.exe 2096 Anarchy Panel.exe -
Loads dropped DLL 1 IoCs
Processes:
Anarchy Panel.exepid process 2096 Anarchy Panel.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AnarchyInstall.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\INCCHECK = "C:\\Users\\Admin\\AppData\\Local\\Temp\\INCCHECK.exe" AnarchyInstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AnarchyInstall.exeAnarchy Panel.exedescription pid process Token: SeDebugPrivilege 2160 AnarchyInstall.exe Token: SeDebugPrivilege 2160 AnarchyInstall.exe Token: SeDebugPrivilege 2096 Anarchy Panel.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Anarchy Loader.exedescription pid process target process PID 3008 wrote to memory of 2160 3008 Anarchy Loader.exe AnarchyInstall.exe PID 3008 wrote to memory of 2160 3008 Anarchy Loader.exe AnarchyInstall.exe PID 3008 wrote to memory of 2160 3008 Anarchy Loader.exe AnarchyInstall.exe PID 3008 wrote to memory of 2096 3008 Anarchy Loader.exe Anarchy Panel.exe PID 3008 wrote to memory of 2096 3008 Anarchy Loader.exe Anarchy Panel.exe PID 3008 wrote to memory of 2096 3008 Anarchy Loader.exe Anarchy Panel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\Anarchy Loader.exe"C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\Anarchy Loader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\AnarchyInstall.exe"C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\AnarchyInstall.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\Anarchy Panel.exe"C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\Anarchy Panel.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD557fdae25873ed915da75aa33c9eb6d66
SHA15f835c20c97fc83b976fbea8345b01d96e5f1546
SHA256c9074dc3e9e6e06260f4e40980ef2fbfd8b50cf449e20f250d277cadbd7909c0
SHA5121191005e24a64b215ea866c8472411e13b22908ae98d42c758bb317bd6182cd671321d7c501db4d779e2234106d7cf8a118eea9f9dd698f578dc25b0098088f6
-
Filesize
1.7MB
MD556a504a34d2cfbfc7eaa2b68e34af8ad
SHA1426b48b0f3b691e3bb29f465aed9b936f29fc8cc
SHA2569309fb2a3f326d0f2cc3f2ab837cfd02e4f8cb6b923b3b2be265591fd38f4961
SHA512170c3645083d869e2368ee16325d7edaeba2d8f1d3d4a6a1054cfdd8616e03073772eeae30c8f79a93173825f83891e7b0e4fd89ef416808359f715a641747d7