Analysis
-
max time kernel
109s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
73dbde7edc03e2bccadb0e033fa54560N.exe
Resource
win7-20240903-en
General
-
Target
73dbde7edc03e2bccadb0e033fa54560N.exe
-
Size
1.3MB
-
MD5
73dbde7edc03e2bccadb0e033fa54560
-
SHA1
3c6fe1a2f1fe7120b97eb63b20457d2de8213d0e
-
SHA256
6666fe51813047da0e83262949e83a1b59214ece4b1b2f3f53d8a31460e0569f
-
SHA512
853177f99307377b2fc37b62f8ccd3fda7d1ae3c8540ac35e675c9db755ca191afda4d124605b3fb064a6b228ca568af2412cbc9e9e55817cb1674f7b66b6a9b
-
SSDEEP
24576:iqgle9pQCnXqSl1aivxBCOGSEKPl6+GH3/e9ln2MW:iGjqSiiXCOGSbPlfGH3G9B3W
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0026000000018e9f-15.dat family_xworm behavioral1/memory/2900-28-0x0000000001110000-0x0000000001128000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1680 powershell.exe 2556 powershell.exe 1496 powershell.exe 2804 powershell.exe 3044 powershell.exe 2368 powershell.exe 2616 powershell.exe 2532 powershell.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00060000000192e3-40.dat acprotect -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2188 DOC Exploit.exe 2900 svchost.exe 2940 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 DOC Exploit.exe 2188 DOC Exploit.exe -
resource yara_rule behavioral1/files/0x00060000000192e3-40.dat upx behavioral1/memory/2188-60-0x0000000010000000-0x00000000100BB000-memory.dmp upx behavioral1/memory/2188-365-0x0000000010000000-0x00000000100BB000-memory.dmp upx -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000016d32-6.dat autoit_exe behavioral1/memory/2188-64-0x0000000000D60000-0x0000000000EF8000-memory.dmp autoit_exe behavioral1/memory/2188-75-0x0000000000D60000-0x0000000000EF8000-memory.dmp autoit_exe behavioral1/memory/2188-140-0x0000000000D60000-0x0000000000EF8000-memory.dmp autoit_exe behavioral1/memory/2188-123-0x0000000000D60000-0x0000000000EF8000-memory.dmp autoit_exe behavioral1/memory/2188-112-0x0000000000D60000-0x0000000000EF8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOC Exploit.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2900 svchost.exe 2940 csrss.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2188 DOC Exploit.exe 2532 powershell.exe 2616 powershell.exe 1680 powershell.exe 2556 powershell.exe 1496 powershell.exe 2804 powershell.exe 3044 powershell.exe 2368 powershell.exe 2900 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2188 DOC Exploit.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2900 svchost.exe Token: SeDebugPrivilege 2940 csrss.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 2900 svchost.exe Token: 33 2520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2520 AUDIODG.EXE Token: 33 2520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2520 AUDIODG.EXE Token: SeBackupPrivilege 1940 vssvc.exe Token: SeRestorePrivilege 1940 vssvc.exe Token: SeAuditPrivilege 1940 vssvc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2188 DOC Exploit.exe 2900 svchost.exe 2188 DOC Exploit.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2188 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 30 PID 1848 wrote to memory of 2188 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 30 PID 1848 wrote to memory of 2188 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 30 PID 1848 wrote to memory of 2188 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 30 PID 1848 wrote to memory of 2900 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 31 PID 1848 wrote to memory of 2900 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 31 PID 1848 wrote to memory of 2900 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 31 PID 1848 wrote to memory of 2940 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 32 PID 1848 wrote to memory of 2940 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 32 PID 1848 wrote to memory of 2940 1848 73dbde7edc03e2bccadb0e033fa54560N.exe 32 PID 2900 wrote to memory of 2532 2900 svchost.exe 33 PID 2900 wrote to memory of 2532 2900 svchost.exe 33 PID 2900 wrote to memory of 2532 2900 svchost.exe 33 PID 2940 wrote to memory of 2616 2940 csrss.exe 35 PID 2940 wrote to memory of 2616 2940 csrss.exe 35 PID 2940 wrote to memory of 2616 2940 csrss.exe 35 PID 2900 wrote to memory of 1680 2900 svchost.exe 37 PID 2900 wrote to memory of 1680 2900 svchost.exe 37 PID 2900 wrote to memory of 1680 2900 svchost.exe 37 PID 2940 wrote to memory of 2556 2940 csrss.exe 39 PID 2940 wrote to memory of 2556 2940 csrss.exe 39 PID 2940 wrote to memory of 2556 2940 csrss.exe 39 PID 2900 wrote to memory of 1496 2900 svchost.exe 41 PID 2900 wrote to memory of 1496 2900 svchost.exe 41 PID 2900 wrote to memory of 1496 2900 svchost.exe 41 PID 2940 wrote to memory of 2804 2940 csrss.exe 43 PID 2940 wrote to memory of 2804 2940 csrss.exe 43 PID 2940 wrote to memory of 2804 2940 csrss.exe 43 PID 2900 wrote to memory of 3044 2900 svchost.exe 45 PID 2900 wrote to memory of 3044 2900 svchost.exe 45 PID 2900 wrote to memory of 3044 2900 svchost.exe 45 PID 2940 wrote to memory of 2368 2940 csrss.exe 47 PID 2940 wrote to memory of 2368 2940 csrss.exe 47 PID 2940 wrote to memory of 2368 2940 csrss.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73dbde7edc03e2bccadb0e033fa54560N.exe"C:\Users\Admin\AppData\Local\Temp\73dbde7edc03e2bccadb0e033fa54560N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\DOC Exploit.exe"C:\Users\Admin\AppData\Local\Temp\DOC Exploit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
C:\ProgramData\csrss.exe"C:\ProgramData\csrss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD50998890ccf8a3d8702db7a84fe6dd7b3
SHA118e561e0ef68fb08d8f391eacd45c7d573206b92
SHA256c33e1408ea96b9ea7a72d44d7742effb4a98776711b7c94c4997a155af61b220
SHA5128132312fb66a9d947eef3f625a4c18b8e640cec51616d0a9fd756e028d1bac5677f5de9a53c3ed32186cb238e8c46613b8c3d6641a6a953d7961412b030c6dd1
-
Filesize
1.6MB
MD5bc8acfc2141fb98925f55201959881f2
SHA1cc4d8f3476eccd2e89790fc9b1964c587621aeaf
SHA2563aa395f65a4c7d67d4821d478328808409fa8bf0db5448787663c296fc85652e
SHA5129a0c4d9070c9106a37d4348a44c803fd50e3a8ae54768280709cf853ad4c0b3c6e00a9e1d8fdc5861f086ec5f48fa230594a257a4c5994702663045476e585a3
-
Filesize
11KB
MD5e7285121adf3ff4ca875ead987bcae79
SHA1469183af23e21db61186b761ca5818adfb5df078
SHA256a228c3faa1af24f858c9491f1d823fdcfee8adef0dfa9808f66d6273a1a5d532
SHA512d62e8d9dfa3dab1020d9f5668a266f839baa30dff19388d01afb5ecca3a3f91a54f66aa57e03bf0537b506c8545a1373d0f25c517b2222820617e877345faf1e
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8
-
Filesize
25KB
MD5034c268ffc3a63db99ef0fe66c14a4e4
SHA19a5383e44a6f7948f7a3c8757e2c2d2e3a9e9260
SHA25617a46eb6076eee70791d378ef29c1c2da61725b51c63242626cc5d93f2219178
SHA5128d197a9ee2282de36958fa6d083341558368187aeced18ef07d263e600313b023f6637671fb30ec236d951d7522ce9e307b3d099b113c7cec45c2599f5935769
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5093a1d1613201f1314a08e4acfb2d606
SHA151abb969613506a2be7ff6fac62d4d5f4b99551d
SHA256170238ba16d3c6ebaa64439bc2f223dbd6aba37e5503c0896eeafb3bd2664785
SHA512e47a862d9c58ffb5e00242ebea824fabdaa6a5d586284f91dfed4733fa680e643c03e659105a72875392cde090f7b61f2da02f74aea7d18d7703b7fecf9c528c
-
Filesize
67KB
MD550dce71a753bad01a07904f2af283123
SHA11beab766071ddeff0c8e577c6717debcee0d21e6
SHA2568fb751033d1546ce28f5dcef171857ee879bdd31d76be2ae556f246c258473f3
SHA5127cdc64dcfa8a0cbc1375a1878f560beb083cd9778ff67c5c0f1b693927c35365b384affc9dc33cade4aeaafded11ac328001a18ccb34a559678c1f50fa886c01
-
Filesize
1.1MB
MD5719c51f5637d922e8416e23d0978b8cb
SHA1ebfc5fe2fcf48a36505716e997b1e2fab6365d85
SHA2566cf0bf46c9ee98fde7eb4dbc0b147e33babeabf9b1f50a4722e29dd57e95ef09
SHA512129a355ca1ace8c8ce7254c285d5e90b55941f18ff5fcaf6109aa502d18f543b7596493ce69c0bc167ce41bdc8622d4bf8529ecbd88fb0d9f963bfbcb91e24ae