Analysis
-
max time kernel
1792s -
max time network
1797s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-09-2024 08:35
Behavioral task
behavioral1
Sample
scieczek.exe
Resource
win10v2004-20240802-en
General
-
Target
scieczek.exe
-
Size
34KB
-
MD5
6d50cc8357e2d82f1cb48e4355dab4ff
-
SHA1
7e1b6cdc6608406caffcfc4beac3fdadc61671e7
-
SHA256
b33a3947a9e557981c3cf132f5ec62992edb1202375db16c2dc2a7be1400ee37
-
SHA512
3fd300c9384ef472e2bb03087dd882a2e17a0f9f1086f3db4d9ad0508a00e659807a745a2064aed1132d593ac69cbc6bfda80e6476ac375ce7bdf091a1f689e5
-
SSDEEP
384:eSyXlquOae6oKoBmoDnnGvBLmlvCwvHixdTD2VR8pkFTBLTIZwYGDcvw9Ikuis1K:VyXiBDAtYvC4CaV9FZ9jkOjhW/4D
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:61672
budget-compiled.gl.at.ply.gg:61672
9U3xtr7TJf46p5TY
-
Install_directory
%AppData%
-
install_file
DiscordClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/920-1-0x0000000000D70000-0x0000000000D7E000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DiscordClient.lnk scieczek.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DiscordClient.lnk scieczek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4400 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 920 scieczek.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE 4400 EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\scieczek.exe"C:\Users\Admin\AppData\Local\Temp\scieczek.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:920
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\FormatResize.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386B
MD5be09cfe5a3681459d82bec719ebdc8e1
SHA17b1771f5fabe031e68f4f79c91ad6995d2cc1dc3
SHA256d0324bbc52a31104b3b3d6c670fca0164604de5f428da399bb8ab56c7b2825b4
SHA512b784875fcc49407d672b3321dd15104ffda4bf99fa24025f99a6940d68956c8ad707743fefc374a7740a80b406bbd252650c9a8b5ef2ead399584c8cbdaabae5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5966cfd08df8049311e55f5b48650aeac
SHA1503593094d1f8457410f1b88052ebe3a46a4c79c
SHA2565fc9503329b22a75548b0d587ce6af8d8eae3e8f5c2e361d1f24cee9a7a77dd9
SHA5122ef199b46e074905fb805b491eadcbd75472a756a2d9795b927ff3a0fb8340016fc66c02b982755763b2085885dbdd80502da3acd56aabe34235d155b272cf0e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD51c092ba261e1d5fbbd5014b2db8b478e
SHA1f01e326b73fa3d845968188da50502e5d5b1c5e0
SHA256f0feda89b650b858e2b24a7e303262ff5d52c4facef798434c1603b0b230b1e5
SHA51275ea8dc4007edfc70ecf0614ba1ee713614907f76f90d4242a1bc2678a120489260d3142d54288a009a9d675fbd7187e6e9164504093b4387c71417818dc9606