Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 17:34
Behavioral task
behavioral1
Sample
stub.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
stub.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
svchost.exe
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
svchost.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
win-xworm-builder.exe
Resource
win10-20240404-en
General
-
Target
win-xworm-builder.exe
-
Size
793KB
-
MD5
835d21dc5baa96f1ce1bf6b66d92d637
-
SHA1
e0fb2a01a9859f0d2c983b3850c76f8512817e2d
-
SHA256
e67f2b34ef647d59eb8ebd4a88f85dc072346ca5c275cba1ee2307b80a560319
-
SHA512
747a9b6cde0207c722a62904a2c8708188f7c9e65e94cf55667e90096f1d1852e145061bd8e764bf30aaca0fb0f4355668feccc951041af735677c4c644aba87
-
SSDEEP
24576:rcHV1ApBOr1sU6uEgjhlOCDw8mEFAuYg2OWpTMqBx+fdTmG2Y4MT9ffD+CzKcbm+:oApBOr1sU6uEgjhlOCDw8mEFAuYg2OWm
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2796 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
wsappx.exepid Process 2276 wsappx.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid Process 2944 tasklist.exe 2632 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 2716 timeout.exe 2296 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2860 schtasks.exe 1804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wsappx.exepid Process 2276 wsappx.exe 2276 wsappx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
win-xworm-builder.exetasklist.exetasklist.exewsappx.exedescription pid Process Token: SeDebugPrivilege 2788 win-xworm-builder.exe Token: SeDebugPrivilege 2944 tasklist.exe Token: SeDebugPrivilege 2632 tasklist.exe Token: SeDebugPrivilege 2276 wsappx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wsappx.exepid Process 2276 wsappx.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
win-xworm-builder.execmd.exewsappx.exedescription pid Process procid_target PID 2788 wrote to memory of 2860 2788 win-xworm-builder.exe 31 PID 2788 wrote to memory of 2860 2788 win-xworm-builder.exe 31 PID 2788 wrote to memory of 2860 2788 win-xworm-builder.exe 31 PID 2788 wrote to memory of 2796 2788 win-xworm-builder.exe 33 PID 2788 wrote to memory of 2796 2788 win-xworm-builder.exe 33 PID 2788 wrote to memory of 2796 2788 win-xworm-builder.exe 33 PID 2796 wrote to memory of 2944 2796 cmd.exe 35 PID 2796 wrote to memory of 2944 2796 cmd.exe 35 PID 2796 wrote to memory of 2944 2796 cmd.exe 35 PID 2796 wrote to memory of 1576 2796 cmd.exe 36 PID 2796 wrote to memory of 1576 2796 cmd.exe 36 PID 2796 wrote to memory of 1576 2796 cmd.exe 36 PID 2796 wrote to memory of 2716 2796 cmd.exe 37 PID 2796 wrote to memory of 2716 2796 cmd.exe 37 PID 2796 wrote to memory of 2716 2796 cmd.exe 37 PID 2796 wrote to memory of 2632 2796 cmd.exe 38 PID 2796 wrote to memory of 2632 2796 cmd.exe 38 PID 2796 wrote to memory of 2632 2796 cmd.exe 38 PID 2796 wrote to memory of 2668 2796 cmd.exe 39 PID 2796 wrote to memory of 2668 2796 cmd.exe 39 PID 2796 wrote to memory of 2668 2796 cmd.exe 39 PID 2796 wrote to memory of 2296 2796 cmd.exe 40 PID 2796 wrote to memory of 2296 2796 cmd.exe 40 PID 2796 wrote to memory of 2296 2796 cmd.exe 40 PID 2796 wrote to memory of 2276 2796 cmd.exe 41 PID 2796 wrote to memory of 2276 2796 cmd.exe 41 PID 2796 wrote to memory of 2276 2796 cmd.exe 41 PID 2276 wrote to memory of 1804 2276 wsappx.exe 42 PID 2276 wrote to memory of 1804 2276 wsappx.exe 42 PID 2276 wrote to memory of 1804 2276 wsappx.exe 42 PID 2276 wrote to memory of 1644 2276 wsappx.exe 44 PID 2276 wrote to memory of 1644 2276 wsappx.exe 44 PID 2276 wrote to memory of 1644 2276 wsappx.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "wsappx" /tr "C:\Users\Static\wsappx.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp976F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp976F.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2788"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1576
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2716
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2788"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2668
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2296
-
-
C:\Users\Static\wsappx.exe"wsappx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "wsappx" /tr "C:\Users\Static\wsappx.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1804
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2276 -s 14924⤵PID:1644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195B
MD5c00415232f4a7829543d74291d90e1dd
SHA1415fea17fe4990395cac949bd7e2f3a146b03ae1
SHA256110e8f95b1ee89031e2ce6536a12ed728668e1635b20e3061d62ae14f391cfdd
SHA5128d9f2ee7e60d0537f703647742a0b79e1537093bbcb6f7b98e6eba24fa282af0ad233ae076879de7c42c21bd423a10f91afeb6bd015d3435a85c5acc592bfd09
-
Filesize
793KB
MD5835d21dc5baa96f1ce1bf6b66d92d637
SHA1e0fb2a01a9859f0d2c983b3850c76f8512817e2d
SHA256e67f2b34ef647d59eb8ebd4a88f85dc072346ca5c275cba1ee2307b80a560319
SHA512747a9b6cde0207c722a62904a2c8708188f7c9e65e94cf55667e90096f1d1852e145061bd8e764bf30aaca0fb0f4355668feccc951041af735677c4c644aba87