Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-09-2024 18:56
Behavioral task
behavioral1
Sample
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe
Resource
win10v2004-20240802-en
General
-
Target
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe
-
Size
50KB
-
MD5
20e2bdf68c3b6acfda5735422b64cbea
-
SHA1
181aa68712a5e2f06f136e065291f083c35f32dc
-
SHA256
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888
-
SHA512
188c77234438a34673cc2b2164c180ff0b3d9f35ff2b17c704b36acb655d47a2a034632a59a3ed4945daae692316774c8a6fd53e80ffc53217c8045f7bc88b36
-
SSDEEP
1536:Tf05a/CTjo89wFc9UR68OMuodS1EAd8IIm:Tf05a/CTD9wFc9U3OMhgEA6IIm
Malware Config
Extracted
xworm
5.0
103.216.158.119:7000
gjV5QKceVphN17zl
-
Install_directory
%ProgramData%
-
install_file
VLC_media.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1392-1-0x0000000000280000-0x0000000000292000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 4176 powershell.exe 1880 powershell.exe 1680 powershell.exe 1748 powershell.exe -
Drops startup file 2 IoCs
Processes:
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_media.lnk 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_media.lnk 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exepid process 1880 powershell.exe 1880 powershell.exe 1680 powershell.exe 1680 powershell.exe 1748 powershell.exe 1748 powershell.exe 4176 powershell.exe 4176 powershell.exe 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 4176 powershell.exe Token: SeDebugPrivilege 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exepid process 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exedescription pid process target process PID 1392 wrote to memory of 1880 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 1880 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 1680 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 1680 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 1748 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 1748 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 4176 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe PID 1392 wrote to memory of 4176 1392 774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe"C:\Users\Admin\AppData\Local\Temp\774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_media.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_media.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD557c07e55b603c3d93f770c75322f1bd7
SHA1c12bdfa4442b8c5dedf36ed58c3bb602facd9d25
SHA2566ed11d21b1a7902a2f9062c4a6f103b1ccae6ab844b28b32aa5add1f7003b143
SHA51244b432712877e2b62eda98e3311068d556031bf60324813b214d8e96db45903b32ed727e63573424edadecd84e3587d1f96fd92558f90504439e1cd9158e045d
-
Filesize
944B
MD5e1406e40bc90234838ab278843448a11
SHA17e056692cfcf53a92ba8582a5fc0d2a418ef0c81
SHA256fdc53165753f599dd5a22b0bd229f8e4c63e73dc47aece0b475c79a7255b1d10
SHA5128ada81e44b16bfca0141dfe52a0b63e3cc7827b8dc45bfea87f834ffb759eeac87426c722b75fd76a447ab5efb69e0053b9fb34bd42d40b413a48f702eb70ab7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82