Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
72aa74d8a1251c3376c6346aaeb5bce0N.exe
Resource
win7-20240903-en
General
-
Target
72aa74d8a1251c3376c6346aaeb5bce0N.exe
-
Size
2.3MB
-
MD5
72aa74d8a1251c3376c6346aaeb5bce0
-
SHA1
54e4ba4d9e09f26f0242a6398498a6ba64e18269
-
SHA256
8834f3d9bea74033c7d66c04af98f8e73be938c30a6ee33f6bb0e03e17a2205c
-
SHA512
ecaa4edb4b9d24d6de5683436ed3f16b0bf4980d475176dd3c9581e0754282f3869a977415d9b1d478d288e7d89235320b0e7202814d7b8e39b1bf57f049918a
-
SSDEEP
24576:4hk6VzDDlAslzOhpvYK/P7xdyviebf+dJ03:4
Malware Config
Extracted
xworm
5.0
orounderandudai.ddnsgeek.com:7071
PVgn8Cl3GrFDVc8H
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-1085.dat family_xworm behavioral1/memory/4980-1092-0x00000000002E0000-0x00000000002F0000-memory.dmp family_xworm -
Executes dropped EXE 1 IoCs
pid Process 4980 orounderandudai.ddnsgeek.com7071.exe -
Loads dropped DLL 1 IoCs
pid Process 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Networks! = "C:\\Users\\Admin\\AppData\\Roaming\\Networks!.exe" 72aa74d8a1251c3376c6346aaeb5bce0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5028 1668 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72aa74d8a1251c3376c6346aaeb5bce0N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4980 orounderandudai.ddnsgeek.com7071.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 4980 orounderandudai.ddnsgeek.com7071.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe Token: SeDebugPrivilege 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe Token: SeDebugPrivilege 4980 orounderandudai.ddnsgeek.com7071.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4980 orounderandudai.ddnsgeek.com7071.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4980 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 31 PID 1668 wrote to memory of 4980 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 31 PID 1668 wrote to memory of 4980 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 31 PID 1668 wrote to memory of 4980 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 31 PID 1668 wrote to memory of 5028 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 32 PID 1668 wrote to memory of 5028 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 32 PID 1668 wrote to memory of 5028 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 32 PID 1668 wrote to memory of 5028 1668 72aa74d8a1251c3376c6346aaeb5bce0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\72aa74d8a1251c3376c6346aaeb5bce0N.exe"C:\Users\Admin\AppData\Local\Temp\72aa74d8a1251c3376c6346aaeb5bce0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\orounderandudai.ddnsgeek.com7071.exe"C:\Users\Admin\AppData\Local\Temp\orounderandudai.ddnsgeek.com7071.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 9522⤵
- Program crash
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD523c59ef7531169fbfab4d04acc59c8bf
SHA1d1830d3f41ec429087e909e5866179a0386d52d8
SHA256fe2b4dfcbcfcf3cf380a0df51b40f840e54c60340c6087d22714c733c57f5e89
SHA5124fed3b33b0a3641ea2462c8f467a99745c0886a49908d9ef023f1b49fc262cdab2d27ccfc819c9f2bd708f8ebe9d143af2208013f96e1915c7b5402b37216872