General
-
Target
adw.exe
-
Size
110KB
-
Sample
240821-mphanaxekn
-
MD5
873d23b0d914da099007377274719e4e
-
SHA1
e821620eecd5231f8e529fd2496fee2ab07e34ff
-
SHA256
9615a875deff7d17a7ca2d968bf3b65360d1f6f58babb85db3f158ffbe50fa3b
-
SHA512
591d3de2e2c474d8bedbd9ebbc7d262aadec3a995f5437bd5adf8de8210f45b671622938629aa73d6fca39718df4c2833a42ff557e8818fe4cc65a29e73c006c
-
SSDEEP
1536:feOqrr19/Rt4mfKCAZKm+WVrB392RN6QWSOgqJEwKXONRl75X2iOb23lMgq59MF:WDvZiotm+Wxh4mQWSASIl75lOELFF
Static task
static1
Behavioral task
behavioral1
Sample
adw.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adw.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
dead-he.gl.at.ply.gg:57200
-
Install_directory
%Public%
-
install_file
svchost.exe
Targets
-
-
Target
adw.exe
-
Size
110KB
-
MD5
873d23b0d914da099007377274719e4e
-
SHA1
e821620eecd5231f8e529fd2496fee2ab07e34ff
-
SHA256
9615a875deff7d17a7ca2d968bf3b65360d1f6f58babb85db3f158ffbe50fa3b
-
SHA512
591d3de2e2c474d8bedbd9ebbc7d262aadec3a995f5437bd5adf8de8210f45b671622938629aa73d6fca39718df4c2833a42ff557e8818fe4cc65a29e73c006c
-
SSDEEP
1536:feOqrr19/Rt4mfKCAZKm+WVrB392RN6QWSOgqJEwKXONRl75X2iOb23lMgq59MF:WDvZiotm+Wxh4mQWSASIl75lOELFF
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1