General
-
Target
SysNoti.exe
-
Size
39KB
-
Sample
240816-h7zkfasclh
-
MD5
6201104487f50867afc28079c841680f
-
SHA1
2337f298ffbda6d628482f8fa42634b3db3ee552
-
SHA256
b3c0c874e28b32b4b35ec578e4e3c59988b8c0c584a2301ea7ae34d8febc6ddd
-
SHA512
de1346c59004ef076bda4e54cca8a8e72b88e997af2a59cc99de997356beef9c0ca3db5d5d39cd14c658822bdebf1dac31ac26361581613eda4440fa05bcdb12
-
SSDEEP
768:bql27+7rmUmv/NGSxd8wlkBwoscPNCxF5Pq9j/CeF67OMhn33g:2lfrGlGb0/BwAFc9zCeF67OMdQ
Behavioral task
behavioral1
Sample
SysNoti.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
take-vocational.gl.at.ply.gg:5524
tT1LzH7uphaZavtD
-
install_file
USB.exe
Targets
-
-
Target
SysNoti.exe
-
Size
39KB
-
MD5
6201104487f50867afc28079c841680f
-
SHA1
2337f298ffbda6d628482f8fa42634b3db3ee552
-
SHA256
b3c0c874e28b32b4b35ec578e4e3c59988b8c0c584a2301ea7ae34d8febc6ddd
-
SHA512
de1346c59004ef076bda4e54cca8a8e72b88e997af2a59cc99de997356beef9c0ca3db5d5d39cd14c658822bdebf1dac31ac26361581613eda4440fa05bcdb12
-
SSDEEP
768:bql27+7rmUmv/NGSxd8wlkBwoscPNCxF5Pq9j/CeF67OMhn33g:2lfrGlGb0/BwAFc9zCeF67OMdQ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1