Analysis

  • max time kernel
    114s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 20:09

General

  • Target

    ZeroxStealerInstaller.exe

  • Size

    2.9MB

  • MD5

    9b1a7d9403b93f7a390d953c2785a9ed

  • SHA1

    0246222a9290cd73bfda0e402722a82d04507a43

  • SHA256

    97b156f53366d0aac2e46c97b8f7bb3efb1a541e0a923aed24c0f8e7d4c4ee25

  • SHA512

    fdf61c48deee07db3563859a934fd9238c3ed33bd68b180fbf46d121b233359b69d3ec6c370f0ca17bbdb444ec8a784985d54a06704dfe1ea22701124b0fc4b0

  • SSDEEP

    49152:qvo+8aGzQqDRtQH/vpxWIfKgVgVKkbmNoi7r+ogPpkZs/ohvc8q8IzIWvuA8KXAb:qh83dRtMvb/KgVLNNwRkVhBNIzWvKo

Malware Config

Extracted

Family

xworm

C2

lijaligibidu-35558.portmap.host:35558

127.0.0.1:28019

chilhoek-28019.portmap.host:28019

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Security.exe

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZeroxStealerInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\ZeroxStealerInstaller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe
      "C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3024
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSecurity.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Windows Security.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4380
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2936
    • C:\Users\Admin\AppData\Roaming\XClient (2).exe
      "C:\Users\Admin\AppData\Roaming\XClient (2).exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient (2).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient (2).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:944
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svhost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svhost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
    • C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe
      "C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    a2c8179aaa149c0b9791b73ce44c04d1

    SHA1

    703361b0d43ec7f669304e7c0ffbbfdeb1e484ff

    SHA256

    c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a

    SHA512

    2e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    e58749a7a1826f6ea62df1e2ef63a32b

    SHA1

    c0bca21658b8be4f37b71eec9578bfefa44f862d

    SHA256

    0e1f0e684adb40a5d0668df5fed007c9046137d7ae16a1f2f343b139d5f9bc93

    SHA512

    4cf45b2b11ab31e7f67fff286b29d50ed28cd6043091144c5c0f1348b5f5916ed7479cf985595e6f096b586ab93b4b5dce612f688049b8366a2dd91863e98b70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    e5663972c1caaba7088048911c758bf3

    SHA1

    3462dea0f9c2c16a9c3afdaef8bbb1f753c1c198

    SHA256

    9f7f29a4696876cadca3f14d7e43f9ede0c97fd64be3f5d94bda49a91b6a419e

    SHA512

    ff4e72c46cf083de62baa2ce2661555dd91b5f144294015f7b262fd4500cb67fe80e1871a82da63b607e3e9cef401f4b73c587bf1134637881ecad51aad1eddc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    65a68df1062af34622552c4f644a5708

    SHA1

    6f6ecf7b4b635abb0b132d95dac2759dc14b50af

    SHA256

    718dc2f5f4a6dbb7fab7f3db05bd7f602fb16526caae7084ab46c3ab4e7bad35

    SHA512

    4e460eb566032942547b58411222dd26ae300a95f83cf5ae6df58ebd28594341123611b348bd4031a33bc7f38307d5cb8fb677bba8c896919e3eee677a104d4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    d28a889fd956d5cb3accfbaf1143eb6f

    SHA1

    157ba54b365341f8ff06707d996b3635da8446f7

    SHA256

    21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

    SHA512

    0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    3db1c0d23daacf01eb99125ccc2787d3

    SHA1

    0849528de1ba411279231d635d8f39d54cc829d2

    SHA256

    bceb96f5c3d31447980eb8cd891bba75b3e5b6eb60abf4d829fc13cd8faf2582

    SHA512

    3d84635a3395bca1d91ce182ccfb9e38c8da87ad678704673a72d580e4251cedc5a6b2a89040a172a5687b67952e74a13673bd115bce7bdabaed06f89323de5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    15dde0683cd1ca19785d7262f554ba93

    SHA1

    d039c577e438546d10ac64837b05da480d06bf69

    SHA256

    d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

    SHA512

    57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rerjfcin.zfu.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe

    Filesize

    75KB

    MD5

    cf219a189dae4a022f26dd58cd5367e6

    SHA1

    76c2e7b756e894afc4e5fd7267fce398d58c518f

    SHA256

    725c0bcdb953e39e96a0192d2712b261541647259e494c583d19697a10d2ffbe

    SHA512

    21dc7cdd5ea07be708a5c696708207a1760851d2fbb608969254a8f3e806bbb87b6b27a4d5f4cecf1b5d90f6fc81759fd9f6222ddafdb955d41b0333ea085f1f

  • C:\Users\Admin\AppData\Roaming\XClient (2).exe

    Filesize

    81KB

    MD5

    c1b7e4e3a25be04cc93a44017bd58298

    SHA1

    b40e7d99a41bd49172cd23470ccb4387b3351942

    SHA256

    9f36f62ffb252f041490ccf9faf344e03a7987a566cc399f0be06e4e5e60fbcb

    SHA512

    4192250e78e0a3440e2b5d1b7782566a55d96fa8a68877ff8869f617ce3095374289c78ea3d200082fb91efb8fcbce8fea946fcfea08cef05265a2c3512f99cf

  • C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe

    Filesize

    2.7MB

    MD5

    e4468845f3b426403f3223a1b18cf858

    SHA1

    9cea44a892f83e660d56a69bc97af2c094b2f087

    SHA256

    7cebe983265c3a77b2a369b56edd521733e9103f1a42fd09dcaf5abf5dd547bd

    SHA512

    c4703c2f3f0bb92020b4d920d5ba2e6ba7e505ae736bc7b4d5289ed8b3faff3748061f731e6f6ecf0aa6d78eccbfa187175a07f54bd7e4b97345f8bc91080840

  • memory/1252-43-0x00000124FDD70000-0x00000124FDF86000-memory.dmp

    Filesize

    2.1MB

  • memory/1252-42-0x00000124E4A00000-0x00000124E4A14000-memory.dmp

    Filesize

    80KB

  • memory/1252-40-0x00000124E2A40000-0x00000124E2D06000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-41-0x00000124FD200000-0x00000124FD34E000-memory.dmp

    Filesize

    1.3MB

  • memory/3492-48-0x0000020606F50000-0x0000020606F72000-memory.dmp

    Filesize

    136KB

  • memory/3580-1-0x0000000000C60000-0x0000000000F50000-memory.dmp

    Filesize

    2.9MB

  • memory/3580-0-0x00007FFF6DB63000-0x00007FFF6DB65000-memory.dmp

    Filesize

    8KB

  • memory/3860-47-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3860-39-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3860-28-0x0000000000060000-0x000000000007A000-memory.dmp

    Filesize

    104KB

  • memory/3860-45-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3984-44-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3984-46-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3984-34-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/3984-24-0x00000000004B0000-0x00000000004C8000-memory.dmp

    Filesize

    96KB