Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 13:19

General

  • Target

    Bootstrapper.exe

  • Size

    883KB

  • MD5

    77e867a3f236eb41a2a20e21c38aa579

  • SHA1

    1ef96b0d018842df9f11b4395b30d5c04f3da0b4

  • SHA256

    8feede6d1d97285dfa2c2ec23184ebcd801e72d547dc9844f5f12903d85e1e98

  • SHA512

    b866bcf34f44dbddc92c082179b42523ca0d05e89afa1501447ebf3e7cb9981f1f4c8655c7be8e919d71940f23c598fea6affae636b9aa1685243f9e31a2d5e2

  • SSDEEP

    24576:1bXDm30y7do7o4W9JHe9k3fQ0MSOLZasH96z27:dXerDe9k3fOSOLZatz

Malware Config

Extracted

Family

xworm

C2

leading-sexuality.gl.at.ply.gg:61430

locations-ff.gl.at.ply.gg:30820

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    RobloxClient.exe

Signatures

  • Detect Xworm Payload 9 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\чгш.exe
      "C:\Users\Admin\AppData\Local\чгш.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\чгш.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'чгш.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\RobloxClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2088
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RobloxClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RobloxClient" /tr "C:\Users\Admin\AppData\Local\RobloxClient.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2520
      • C:\Users\Admin\AppData\Local\Temp\djndhr.exe
        "C:\Users\Admin\AppData\Local\Temp\djndhr.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\djndhr.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2500
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'djndhr.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1672
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\driv'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2808
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'driv'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2196
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "driv" /tr "C:\Users\Admin\AppData\Roaming\driv"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2960
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /f /tn "RobloxClient"
        3⤵
          PID:684
        • C:\Users\Admin\AppData\Local\Temp\oibapi.exe
          "C:\Users\Admin\AppData\Local\Temp\oibapi.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\oibapi.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1108
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'oibapi.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\svchost.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1400
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2112
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost.exe"
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2168
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3F61.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:1748
      • C:\Users\Admin\AppData\Local\Bootstrapper.exe
        "C:\Users\Admin\AppData\Local\Bootstrapper.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2768 -s 1072
          3⤵
          • Loads dropped DLL
          PID:2720
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {E923023B-FE7A-47FB-88F5-A85EAC379796} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Admin\AppData\Local\RobloxClient.exe
        C:\Users\Admin\AppData\Local\RobloxClient.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
      • C:\Users\Public\svchost.exe
        C:\Users\Public\svchost.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:900
      • C:\Users\Admin\AppData\Roaming\driv
        C:\Users\Admin\AppData\Roaming\driv
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\djndhr.exe

      Filesize

      79KB

      MD5

      4094bb0ec3ece9871da2a39a7ee6ab1c

      SHA1

      68f2285319fe716d47568e8a46e0cfedbf8ed6e7

      SHA256

      841ecd200c021335e5f37f65ab0be89f9e8d739ba55831f1ed8c4f4ecba42b6d

      SHA512

      fb2da9013e42f4e6a30c985b24eba1a010e3c4f06576f08fe80b3e195c919b25c400108605db6dbd5bdf682c169661fcbcf75b8ba64edb38ee39ef217c762506

    • C:\Users\Admin\AppData\Local\Temp\oibapi.exe

      Filesize

      72KB

      MD5

      1d985f2ec2fa62a01b2f49d597093066

      SHA1

      daf01275745b56c0163ad2820130a73cd2c5fd18

      SHA256

      36f9edfea5b0d1586607f1c735bc98aaefbaa80e7ec17c618430eac6f4290683

      SHA512

      941152ec68c8bf548563c1957ae9434464aa509397ee5a51984b28e02986a539533be13e5c029557a69752fc13d9a5d51d5b721df9c3c3e06e157481c5a2c627

    • C:\Users\Admin\AppData\Local\Temp\tmp3F61.tmp.bat

      Filesize

      153B

      MD5

      9bed60e14ba3932fb79fe212d0a644d9

      SHA1

      cc8e157a5a17402cb6e6be4d044e2114bae62008

      SHA256

      4f2e2ca6d4ec13cc5f600dc5b42bd4182299aefc67a74fe6ee513f1316a67070

      SHA512

      90294170cc3bb04d5e544f055b388b2443aee7538d09abf55d0820ced846443137e011a2dc9b42568eba07ff026b0923883718d9ffa94757cacf69ce741ce50c

    • C:\Users\Admin\AppData\Local\чгш.exe

      Filesize

      74KB

      MD5

      6560fb9e69125fb9b92373a503c5bd64

      SHA1

      09bffb5a4e83c5496d7df6a25abeca9b51625746

      SHA256

      ea2d71055ca2e640f63cd26272692550794b63c442647e6d80290b0495557011

      SHA512

      5d6f75b3e89c1dc95ec46fc921c9635504c8a212e19c352547ee0d406629e9e30e12024165467bde5ee4ce142323ea197c90949e061eaa661af195869d4189f9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XJQYZ4Q6JK6HF2NXXSC5.temp

      Filesize

      7KB

      MD5

      22699cf1aa5973840619342d147c1f5d

      SHA1

      736be839d60b840217958cb1c2417ef416ea30ff

      SHA256

      578aabba1e4fa6160931ad18d66fb878d8165619bd1183bb59691b8f268c9475

      SHA512

      7901f6d2b44db739d5421e1550fb904ccbe2a83b1e9b297c21a9469e7db109b1f2252454ccc49718c03394b14ace603121788223296f83d9f33c771bf313aec9

    • \Users\Admin\AppData\Local\Bootstrapper.exe

      Filesize

      796KB

      MD5

      4b94b989b0fe7bec6311153b309dfe81

      SHA1

      bb50a4bb8a66f0105c5b74f32cd114c672010b22

      SHA256

      7c4283f5e620b2506bcb273f947def4435d95e143ae3067a783fd3adc873a659

      SHA512

      fbbe60cf3e5d028d906e7d444b648f7dff8791c333834db8119e0a950532a75fda2e9bd5948f0b210904667923eb7b2c0176140babc497955d227e7d80fb109d

    • memory/900-137-0x00000000000D0000-0x00000000000E8000-memory.dmp

      Filesize

      96KB

    • memory/1068-57-0x0000000001220000-0x0000000001238000-memory.dmp

      Filesize

      96KB

    • memory/1536-78-0x00000000009B0000-0x00000000009C8000-memory.dmp

      Filesize

      96KB

    • memory/1672-91-0x0000000001E80000-0x0000000001E88000-memory.dmp

      Filesize

      32KB

    • memory/1976-0-0x000007FEF4C83000-0x000007FEF4C84000-memory.dmp

      Filesize

      4KB

    • memory/1976-1-0x0000000000AB0000-0x0000000000B94000-memory.dmp

      Filesize

      912KB

    • memory/2000-136-0x00000000001D0000-0x00000000001EA000-memory.dmp

      Filesize

      104KB

    • memory/2436-63-0x0000000001250000-0x000000000126A000-memory.dmp

      Filesize

      104KB

    • memory/2680-52-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

      Filesize

      9.9MB

    • memory/2680-51-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

      Filesize

      9.9MB

    • memory/2680-50-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

      Filesize

      9.9MB

    • memory/2680-79-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

      Filesize

      9.9MB

    • memory/2680-15-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

      Filesize

      9.9MB

    • memory/2680-7-0x0000000000D70000-0x0000000000D88000-memory.dmp

      Filesize

      96KB

    • memory/2704-21-0x0000000002240000-0x0000000002248000-memory.dmp

      Filesize

      32KB

    • memory/2704-20-0x000000001B7C0000-0x000000001BAA2000-memory.dmp

      Filesize

      2.9MB

    • memory/2768-14-0x0000000001380000-0x000000000144E000-memory.dmp

      Filesize

      824KB

    • memory/2940-32-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

      Filesize

      2.9MB

    • memory/2940-33-0x0000000001DB0000-0x0000000001DB8000-memory.dmp

      Filesize

      32KB