General
-
Target
Perm.exe
-
Size
276KB
-
Sample
240914-mwgmps1akg
-
MD5
5ab1e573561e0605d1535be042dba7f6
-
SHA1
dc9eb01c5218912b2c80925133fc473c6e8b0557
-
SHA256
3dde08907e65ec9f83c9446e59eebe1dffa6724a244a951ea39c4a571861dae4
-
SHA512
2cb86414f4c1e8116b992aa85c58d2531d2e0eb5abc691dd5801f14a1b178dc52dbe3eed34e5f2f3f2ffe4a6f8bd4e490fc5a9071de0bd2c9d5dc19d418f8c66
-
SSDEEP
6144:3ioZIt1bH9Kgmr6uzzzzdhXV57nWo2RBvQ6VZpZPe:TKr9KgAlhXVdWz2YfU
Behavioral task
behavioral1
Sample
Perm.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:46540
147.185.221.22:46540
-
Install_directory
%AppData%
-
install_file
perm.exe
Targets
-
-
Target
Perm.exe
-
Size
276KB
-
MD5
5ab1e573561e0605d1535be042dba7f6
-
SHA1
dc9eb01c5218912b2c80925133fc473c6e8b0557
-
SHA256
3dde08907e65ec9f83c9446e59eebe1dffa6724a244a951ea39c4a571861dae4
-
SHA512
2cb86414f4c1e8116b992aa85c58d2531d2e0eb5abc691dd5801f14a1b178dc52dbe3eed34e5f2f3f2ffe4a6f8bd4e490fc5a9071de0bd2c9d5dc19d418f8c66
-
SSDEEP
6144:3ioZIt1bH9Kgmr6uzzzzdhXV57nWo2RBvQ6VZpZPe:TKr9KgAlhXVdWz2YfU
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1