Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 10:38

General

  • Target

    adw.exe

  • Size

    110KB

  • MD5

    873d23b0d914da099007377274719e4e

  • SHA1

    e821620eecd5231f8e529fd2496fee2ab07e34ff

  • SHA256

    9615a875deff7d17a7ca2d968bf3b65360d1f6f58babb85db3f158ffbe50fa3b

  • SHA512

    591d3de2e2c474d8bedbd9ebbc7d262aadec3a995f5437bd5adf8de8210f45b671622938629aa73d6fca39718df4c2833a42ff557e8818fe4cc65a29e73c006c

  • SSDEEP

    1536:feOqrr19/Rt4mfKCAZKm+WVrB392RN6QWSOgqJEwKXONRl75X2iOb23lMgq59MF:WDvZiotm+Wxh4mQWSASIl75lOELFF

Malware Config

Extracted

Family

xworm

C2

dead-he.gl.at.ply.gg:57200

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\adw.exe
    "C:\Users\Admin\AppData\Local\Temp\adw.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\svchost.exe
      "C:\Users\Admin\AppData\Local\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2908
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {DF1A8BD6-CD62-4801-A9E7-E83147BA78CD} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Public\svchost.exe
      C:\Users\Public\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:276
    • C:\Users\Public\svchost.exe
      C:\Users\Public\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3016
    • C:\Users\Public\svchost.exe
      C:\Users\Public\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\svchost.exe

    Filesize

    93KB

    MD5

    8d04dd1724cebcf83c6444a89f3cc284

    SHA1

    f3c70909956bbfb7807bfc816d198e8aa2d4928c

    SHA256

    c693a093fac8ddbfe9e2ba991df7fd70e685bad91ade6e9193802dabe8b64162

    SHA512

    f4582b3f8d98516cdbf77efb9acfd27b9cf687cdf75291b3f3bcb474a91f04947fbe6845c699e6abe9935c5a6089fde2ef256ee98fa512f8a3ce6c81d5f57e1c

  • memory/276-18-0x0000000000D60000-0x0000000000D7E000-memory.dmp

    Filesize

    120KB

  • memory/1676-21-0x0000000000EE0000-0x0000000000EFC000-memory.dmp

    Filesize

    112KB

  • memory/1676-26-0x000000001B310000-0x000000001B35A000-memory.dmp

    Filesize

    296KB

  • memory/1676-8-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

    Filesize

    9.9MB

  • memory/1676-9-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

    Filesize

    9.9MB

  • memory/1676-14-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

    Filesize

    9.9MB

  • memory/1676-31-0x0000000001010000-0x000000000101E000-memory.dmp

    Filesize

    56KB

  • memory/1676-19-0x0000000000ED0000-0x0000000000EDE000-memory.dmp

    Filesize

    56KB

  • memory/1676-20-0x000000001D640000-0x000000001D922000-memory.dmp

    Filesize

    2.9MB

  • memory/1676-29-0x000000001DFC0000-0x000000001E310000-memory.dmp

    Filesize

    3.3MB

  • memory/1676-22-0x000000001AD30000-0x000000001AD78000-memory.dmp

    Filesize

    288KB

  • memory/1676-23-0x0000000001000000-0x0000000001008000-memory.dmp

    Filesize

    32KB

  • memory/1676-24-0x000000001B900000-0x000000001B9A6000-memory.dmp

    Filesize

    664KB

  • memory/1676-25-0x000000001ADF0000-0x000000001AE24000-memory.dmp

    Filesize

    208KB

  • memory/1676-7-0x0000000001020000-0x000000000103E000-memory.dmp

    Filesize

    120KB

  • memory/1676-27-0x000000001AC90000-0x000000001ACA6000-memory.dmp

    Filesize

    88KB

  • memory/1932-33-0x00000000003E0000-0x00000000003FE000-memory.dmp

    Filesize

    120KB

  • memory/2416-0-0x000007FEF5FA3000-0x000007FEF5FA4000-memory.dmp

    Filesize

    4KB

  • memory/2416-1-0x0000000000980000-0x00000000009A2000-memory.dmp

    Filesize

    136KB