General
-
Target
c22dc50dc2bbe4422c7f68d26ab95eb9.zip
-
Size
27KB
-
Sample
240917-z6styawanp
-
MD5
31be67fea166d4f1c4278bd81f041b66
-
SHA1
24a0611f17ff0f84dd2b540a96dacb3ac4bd334b
-
SHA256
08f327fa721faf4fa748844b307ffb66ee56370e705c0b34942d4084a88ab469
-
SHA512
a989b2b108033c4c81b77c8dc6e2de0d0d593cbd4b65dcfa54f967569df56f56a05eb0b92e7bd0bb6cce024ac11ed449939291d815c1a60cd9a8dd8c88b72995
-
SSDEEP
768:Iuj5YRauxrSE6oYBaKKAy9hkzxv7e6tDLS/:PEamP6oPKyYzxaeo
Static task
static1
Behavioral task
behavioral1
Sample
c22dc50dc2bbe4422c7f68d26ab95eb9.js
Resource
win11-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
xworm
5.0
127.0.0.1:7000
pkJ7wMfjO0FqUPb3
-
install_file
USB.exe
Targets
-
-
Target
c22dc50dc2bbe4422c7f68d26ab95eb9.js
-
Size
92KB
-
MD5
abbf8daa7bcdaca739f4d3fc4ebae091
-
SHA1
1706784a398f62b28b178ca471446ed2dbb2aee9
-
SHA256
a58fe10a096397b8eb9404af4ab8dfe14b1d88ae043f480f93697591ae262626
-
SHA512
91d0b100ee6f708f4708e7e3ae9a7407c53a3e16f3fb58ea79b15751bf5edb1cfde75184ae0c7e3148ddc0170d9b8ad587cedbc856f10c8f40b2a62e13d56e9e
-
SSDEEP
1536:JiPdxrC3WtVFyIcQwYJWOlA/Zk0pRZw6lw1rPTf:J+w2WhlprwXpTf
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Looks for Xen service registry key.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1