Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe
Resource
win10v2004-20240802-en
General
-
Target
8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe
-
Size
156KB
-
MD5
aa50dea32c4398f49128d5b903a38aef
-
SHA1
cca7429109dd0e0d2d7f046a6af4ff40773d6722
-
SHA256
8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523
-
SHA512
6ae2342df6fd7f0b70562b40d608f5f0c8b2230715934adff39ddae01ff7c0cfa9e78bf4261df473a73ad71cdea963d08ce36b919a5ca0f3a264af32eb5795c9
-
SSDEEP
3072:NUWIAXFeSQ0oMfYMp2fCoeq63ychNeGQVm3Q4x4+VQ6s:NdIuppY6sdeZywNeGC4xI
Malware Config
Extracted
xworm
3.0
sites-sing.gl.at.ply.gg:6789
hsYEUqkLaSySRVeL
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000012286-5.dat family_xworm behavioral1/memory/2940-13-0x0000000001350000-0x0000000001360000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0033000000015d87-10.dat family_stormkitty behavioral1/memory/2936-15-0x0000000000F50000-0x0000000000FA6000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1800 powershell.exe 1304 powershell.exe 1236 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2940 svchost.exe 2936 zzzz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.exe" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\ProgramData\MUYDDIIS\FileGrabber\Desktop\desktop.ini zzzz.exe File created C:\ProgramData\MUYDDIIS\FileGrabber\Documents\desktop.ini zzzz.exe File created C:\ProgramData\MUYDDIIS\FileGrabber\Downloads\desktop.ini zzzz.exe File created C:\ProgramData\MUYDDIIS\FileGrabber\Pictures\desktop.ini zzzz.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 freegeoip.app 9 freegeoip.app 15 api.ipify.org 16 api.ipify.org 17 ip-api.com 26 api.ipify.org 27 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzzz.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 zzzz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zzzz.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2936 zzzz.exe 2936 zzzz.exe 2936 zzzz.exe 2936 zzzz.exe 2936 zzzz.exe 2936 zzzz.exe 1800 powershell.exe 1304 powershell.exe 1236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2940 svchost.exe Token: SeDebugPrivilege 2936 zzzz.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 1304 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 2940 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2940 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 30 PID 2480 wrote to memory of 2940 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 30 PID 2480 wrote to memory of 2940 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 30 PID 2480 wrote to memory of 2936 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 31 PID 2480 wrote to memory of 2936 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 31 PID 2480 wrote to memory of 2936 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 31 PID 2480 wrote to memory of 2936 2480 8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe 31 PID 2940 wrote to memory of 1800 2940 svchost.exe 33 PID 2940 wrote to memory of 1800 2940 svchost.exe 33 PID 2940 wrote to memory of 1800 2940 svchost.exe 33 PID 2940 wrote to memory of 1304 2940 svchost.exe 35 PID 2940 wrote to memory of 1304 2940 svchost.exe 35 PID 2940 wrote to memory of 1304 2940 svchost.exe 35 PID 2940 wrote to memory of 1236 2940 svchost.exe 37 PID 2940 wrote to memory of 1236 2940 svchost.exe 37 PID 2940 wrote to memory of 1236 2940 svchost.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe"C:\Users\Admin\AppData\Local\Temp\8fe04c6d9be067ca408438d4fcf316b7ff72897700e86f683ba65a1bea677523.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\zzzz.exe"C:\Users\Admin\AppData\Local\Temp\zzzz.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
299KB
MD55f106570d81458e9280086d6a86904aa
SHA102442b5ee510a4c260f3c06d4ab7002973367880
SHA256b3cd31157b20d777c01057303bf2ed6c53bfbdce5cca33e03b3da29febd9c2bc
SHA512e757be4cf54ccb19dadd0e99e3d9424a174c0318ee66ee8df40af250351f4a130a3d67139a7244e85fae3d13374a165f02b93888776f85b31ca0aea642dd046d
-
Filesize
368KB
MD5345ceda7e465986632070c4535042693
SHA1d4aff995ea683104ca8a90c7050575282a5bf75b
SHA256c03fd4804da45fac2d029f5ae0b0f9fe96c0af1c0864e69e5894d2faa3a1f8c7
SHA5123d14d9f22b078d182f36a2d7bfeb25b31d9c23b8b51902d120a330950ae8693f109ad6e3582069a9642f8128747e514bd2576e2eb73a4aa5351343050a591a53
-
Filesize
231KB
MD55d9049a52c5ee3b8122070c5a3784fbf
SHA1ef517827e47388ed96dc99883fc6a07589b0abfe
SHA256d637223c2c1242a9cf121ce37114f5036e89696a8befe080da1317c01f4aa3d3
SHA512e1c0917888d6c3aec6d3d85cafb72078d656f86f0aac4fcdc77ae86994fc1b6bdf4c577939cbc5fc28f62768b529dda6e46eadd47544768fe8b157ca79c73046
-
Filesize
449KB
MD55e4ed0843fd1634d061db898ce75a117
SHA18945024102fa7075fa8e562aa1e439f28f0c0cb8
SHA256f868699b5f3d0a7d7e195f6c49ad69e7ea6b5cda21a21d40df2a1af6b3d7f156
SHA512e1cfcc3aec9810ee0e976dafe258d247e1c5e82ce038ff43e2c0e9be4217d707cb76c61bcefb6d558edf64dfcde3e1fe4cd7e765893fc31cec225531aa64b26a
-
Filesize
1.1MB
MD53a0b3ec93a84a69d2bbf4d101c37f997
SHA126118f4e166eeadd877a05ac8e318072ad208b51
SHA25693e53f8d5ac468355870b82422a4aae5c87f0c8137d31e69fc180943a81c9bc0
SHA5122cf8508c408fb4ba4b8c764dd81dcf140d83f289ef0483a5d40c5505775aebbdf623eca74d385e0adfde6c70e85a4545268b289c420fb61a84ad3699b6220412
-
Filesize
1.3MB
MD59bcacd88d9eae06eb760d2bce743e16c
SHA1b8cf766d8b2083f2da533df7dfeaace455526f3b
SHA2561780ca831902fd789420240450bcb0ee448ff2db53670b04820baaed30bc444d
SHA512b8e040265f898e8755e0afe524f654338f371f59811196b5d74d7b2b1bc3042c062a2fe17c27763e60d6c5bba6369256e815ad7929dd9dc83409d0a070b282ae
-
Filesize
497KB
MD5a22902ff660be0d88bf91453590fc3f3
SHA1ed4a71fb41587cb068ee706aabb88d2b84321401
SHA2563dc4ac5e5f8525838f51c6c9126ac43d02df36c460cf163bac910084bc2479ed
SHA5129cf6138c9176400e230b4258a993c4a4c7641b45195095e97c2603fde25dcef7550e6d91eb4f88d3de627cbf1ffa1e5a6caa1456a53f77afbe4652f81ef9fdee
-
Filesize
331KB
MD5f50d1d3c27cab87c13a3bb32200562e4
SHA1a7771739646433783fff37b1424554f2b2911b96
SHA2563a387315ab3ff8e2fe2ad35bf6d5a03856a8eb2cc67244bb358f9d1469c5ac2f
SHA512b1c6bc2f89b88f81ab2239c1c5fbcd5287131b239710394874d1515b2b1a1392c05a98988befcd13b481296b99c6aaa92ba036c758efcb34442c09313baa1f09
-
Filesize
260KB
MD55ff972fbfbea2e47949a738eb4b3c87e
SHA112501b453b85a1fb625a8ee411f7ea4ca3c60b35
SHA256a0bc04018ef19c8e3d92fc217bcb8b33d1658eae0dd796c51f584ca438706943
SHA5120685e6a9425e53e6713649b5157d87d91151641a55197dd913e60dc26ae61c22172de57c17ac32eb6ce2879bb7ebb80ada483e974e1ed2185c4b6b7ab673c49f
-
Filesize
580KB
MD570eb14fbe1349884bf91e3fb13ad55de
SHA1779f0a8633d2cdc491c9b3b510bdc9956872b744
SHA256389034dfb1926b464f2ec0abe71e79f55919356db565d7d84d0763b8ee7bcd2e
SHA5127418474e048d174b6b1a9ce565683d90c52511f0ec67a85df9b6cc7426c8597f166cc6ef940aab827990c982368036cc83d533dc2421067daa7b3f2f80a6e1d7
-
Filesize
597KB
MD56062304de3add9dbcb65caa19ec7bcdd
SHA1ef2d52896e3aac1596510a2a46d6ba2144efa7c9
SHA2563b9c583bad97707e848cc639b481b426579432d7d11003fdc6c68b67bba60295
SHA5126eb4d3ae816b6833c13be100bea54ee293e888a955234ecc19e2148ae398a546c82994ea7cc1c32af74a667fa19337fce610f7d8c0fc9aaeb1f5a687bdb11c84
-
Filesize
255KB
MD5d2663a1edf1d631f916ea240d8d83654
SHA158186a9ee455ebd713bff103606fdaeacf3ee609
SHA256a99d3f53dbdae7db21da31458a01a19896ed09890c8a3e3d91e810b542c3f002
SHA512d212aa5b9915b219fdea877cbc5ae9274ca43f7d9b45c09800b3042103492b96af78bdc214812814046c7effadf45f7a0e5a614ed3357885966ffb6f9738acc4
-
Filesize
725KB
MD5e09c7e8e491ffd81737efb0ddfafccb2
SHA1e6ed7c2767966989ef3baca3d123582073716b91
SHA256e2c0b0370584279ee03e62abd9d665a78e9c6489db343c1d4b2014ff565782cf
SHA512fd0aa7005fb12ddbbe57517268ff4a1cfc84a18222ac1a3f41c3d82aa0e0b3e63eb4fc9437be638b60865292ecd614e7be6f988504bc287de804f5fb38683f71
-
Filesize
35KB
MD590feaeac1ed833652f5267124acd8293
SHA1ba3fa9aa1c28e54d712bf8766234410d56494859
SHA256a9ad869209d1344ab64479f2f1557291b97358451a4aa6d32da2f570de02851b
SHA5120b29579c520bd59fddb14e50c2f4c7ab407ee6177cc2682461c1308f78bacfc151b5d3fc16c2b5b566fca40fdba683cf403b7efaa23fe3b9b5efec1ad0568042
-
Filesize
320KB
MD5de4824c195cf1b2bb498511ef461e49b
SHA1f15ca6d0e02c785cce091dbd716cd43e3f5a80bd
SHA25651813dfedbe02f03d08b4728187eadb4948d8be40c9d8fe6e4e1cb61fa7ae209
SHA512b211a636f2799d90ce38348dbbc7dbc69ac5374129c7896a137f03a57fe78139a030c1edb90cfc4203799d77a8720df431da75986aa1d8b16274030ad1db770a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59e15157b00e6c377e52f739ab5f09ad5
SHA1633facc32a4501fac0ea66a7c46afa897dd64506
SHA2569183046b5792c1bd784834d3e2772d63b01283fd34ecfb890efd6dec2767bc39
SHA512081ed449e3afe0c28d06a1df33827f7c7eafad86c548d698059729281ab88771066834fc174e8cc23febf79f0fdafdb02441146efa735932bfb0bfa57a3e563b