Analysis

  • max time kernel
    119s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 21:04

General

  • Target

    Celestial.exe

  • Size

    297KB

  • MD5

    9b650b738d97c0e39717fe86401a6726

  • SHA1

    34f361ab5024ad4390a3906cb3fff5a7b5f7e656

  • SHA256

    e94a439b85ca5bc7d19dda9a6ea43d921c385f99dedf8b6a6560cb747e43e264

  • SHA512

    a6664916c5c1bfd66e58face5c1811f95b6489c3e1d4728d4efee92233192fb145c8f0cca46582d560356b92732a8727794a7d8765d16c4df567eb5eb84b1e30

  • SSDEEP

    6144:Ka4InuJg58BkgqPoDH49n8Bb/cQ/gW/tQtbgk3KlRWvWl/HrrACG7:Kat0EAH49n8BLgSZQKXW+l/HnACs

Malware Config

Extracted

Family

xworm

C2

engineering-thoroughly.gl.at.ply.gg:32901

20.ip.gl.ply.gg:32901

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Celestial.exe
    "C:\Users\Admin\AppData\Local\Temp\Celestial.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
    • C:\Users\Admin\AppData\Local\Temp\1Celestial.exe
      "C:\Users\Admin\AppData\Local\Temp\1Celestial.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1Celestial.exe

    Filesize

    162KB

    MD5

    d726f0f603538577a7e12448419fed1a

    SHA1

    1ea8047f9e825c9dd648a12c98689e1c6ad11c70

    SHA256

    e4d2faf2aa895163625ea12416ce945b256f0e13b8327152d6eb80f3ee9fc332

    SHA512

    a9643b891d7a092799ee032c032daa0e1303f639a1893fe1ea7e2830cbae12dbb0d754ebe7bbedcb2396f6bfed5539a932c8f8726b7ff13e217fc39f630b7dfd

  • \Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    66KB

    MD5

    2c2bf7640b13839dcffc5524e9ff6972

    SHA1

    4e91d65f34a33498b39419dbffee5efd8703ca05

    SHA256

    58588e19dac77c6689a6167865f9ad8f0fe531afbe4d66243d55f3e0e5a555c4

    SHA512

    980afa1660da3522c5a0d6296fb1fe9ddcb53dfa829d6d64bd9c63714147536c090f12c9f533e67187d5250b5a219a9c9aa876ee375995a2e1cb1dac1e6de65e

  • memory/1876-31-0x0000000000EE0000-0x0000000000F0E000-memory.dmp

    Filesize

    184KB

  • memory/1876-36-0x0000000000440000-0x000000000044C000-memory.dmp

    Filesize

    48KB

  • memory/1876-37-0x0000000000C40000-0x0000000000C4A000-memory.dmp

    Filesize

    40KB

  • memory/2580-30-0x0000000000940000-0x0000000000956000-memory.dmp

    Filesize

    88KB