Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:08
Behavioral task
behavioral1
Sample
x.exe
Resource
win7-20240903-en
General
-
Target
x.exe
-
Size
50KB
-
MD5
20e2bdf68c3b6acfda5735422b64cbea
-
SHA1
181aa68712a5e2f06f136e065291f083c35f32dc
-
SHA256
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888
-
SHA512
188c77234438a34673cc2b2164c180ff0b3d9f35ff2b17c704b36acb655d47a2a034632a59a3ed4945daae692316774c8a6fd53e80ffc53217c8045f7bc88b36
-
SSDEEP
1536:Tf05a/CTjo89wFc9UR68OMuodS1EAd8IIm:Tf05a/CTD9wFc9U3OMhgEA6IIm
Malware Config
Extracted
xworm
5.0
103.216.158.119:7000
gjV5QKceVphN17zl
-
Install_directory
%ProgramData%
-
install_file
VLC_media.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2240-1-0x0000000001230000-0x0000000001242000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2428 powershell.exe 2592 powershell.exe 2644 powershell.exe 1064 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_media.lnk x.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_media.lnk x.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2592 powershell.exe 2644 powershell.exe 1064 powershell.exe 2428 powershell.exe 2240 x.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2240 x.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2240 x.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 x.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2592 2240 x.exe 32 PID 2240 wrote to memory of 2592 2240 x.exe 32 PID 2240 wrote to memory of 2592 2240 x.exe 32 PID 2240 wrote to memory of 2644 2240 x.exe 34 PID 2240 wrote to memory of 2644 2240 x.exe 34 PID 2240 wrote to memory of 2644 2240 x.exe 34 PID 2240 wrote to memory of 1064 2240 x.exe 36 PID 2240 wrote to memory of 1064 2240 x.exe 36 PID 2240 wrote to memory of 1064 2240 x.exe 36 PID 2240 wrote to memory of 2428 2240 x.exe 38 PID 2240 wrote to memory of 2428 2240 x.exe 38 PID 2240 wrote to memory of 2428 2240 x.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\x.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_media.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_media.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IDRS6ZY5AALLHBGQO3XD.temp
Filesize7KB
MD5141d7da9591439732a769b7e34ba7362
SHA13820fa0dbe2b4d6ef9eeb63f1a2bf203d800db83
SHA2568b9615ef6e38fab6adcb46045d375bd02a6e779889c2dcde329e73abefb25e99
SHA512adda32804c7ad627ac8009aa415b38f4af00e6178ef75c9ac75c3fed1b812c1d49e4104cf4697fd76090c49d305558021119ac467aad8ff1c1b68b4bf4747519