Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe
Resource
win7-20240903-en
General
-
Target
ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe
-
Size
10.0MB
-
MD5
dab050b457fabfc929d8eab6fe8378f3
-
SHA1
0fe3645c1de2cbd3afd2ee24c87f1d36529ef26c
-
SHA256
ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66
-
SHA512
0b0c8e6b1057c7b9ac4a0b7535340b1a98d1b23c22715617247557c7e9bf31d4623f3451d1132b7d55c0425bef4f07e280a214092228d594ddfc45522e0f7fa1
-
SSDEEP
196608:nRduGDGZidQYf8P8rGXr5zINFsb5DR0tkz7lDBvNnhlz8LcvBgnqv+:nRduGlQYK8Kb5zIjYN0tkflJnh8ov+
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234a5-17.dat family_xworm behavioral2/memory/4184-27-0x0000000000DA0000-0x0000000000DB6000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 468 powershell.exe 2968 powershell.exe 3008 powershell.exe -
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1332-29-0x00000000076B0000-0x000000000820C000-memory.dmp net_reactor behavioral2/memory/1332-31-0x0000000008210000-0x0000000008D68000-memory.dmp net_reactor behavioral2/memory/1332-33-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-34-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-37-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-42-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-44-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-40-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-38-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-48-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-54-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-52-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-62-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-67-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-72-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-75-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-70-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-68-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-78-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-86-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-89-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-90-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-93-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-96-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-94-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-84-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-82-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-81-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-76-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-64-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-60-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-58-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-56-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-50-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor behavioral2/memory/1332-46-0x0000000008210000-0x0000000008D64000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedgewebview2.exe.lnk msedgewebview2.exe -
Executes dropped EXE 3 IoCs
pid Process 1332 Everspy Ultimate.exe 4184 svchost.exe 1432 msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everspy Ultimate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2968 powershell.exe 2968 powershell.exe 3008 powershell.exe 3008 powershell.exe 468 powershell.exe 468 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4184 svchost.exe Token: SeDebugPrivilege 1332 Everspy Ultimate.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 1432 msedgewebview2.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 468 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1332 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 82 PID 3488 wrote to memory of 1332 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 82 PID 3488 wrote to memory of 1332 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 82 PID 3488 wrote to memory of 4184 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 83 PID 3488 wrote to memory of 4184 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 83 PID 4184 wrote to memory of 2968 4184 svchost.exe 84 PID 4184 wrote to memory of 2968 4184 svchost.exe 84 PID 3488 wrote to memory of 1432 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 86 PID 3488 wrote to memory of 1432 3488 ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe 86 PID 1432 wrote to memory of 3008 1432 msedgewebview2.exe 91 PID 1432 wrote to memory of 3008 1432 msedgewebview2.exe 91 PID 1432 wrote to memory of 2292 1432 msedgewebview2.exe 93 PID 1432 wrote to memory of 2292 1432 msedgewebview2.exe 93 PID 4184 wrote to memory of 468 4184 svchost.exe 100 PID 4184 wrote to memory of 468 4184 svchost.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe"C:\Users\Admin\AppData\Local\Temp\ad8316d8ceb2a168642c5a1ce2025a87791203f624e1ed4eee8f203cf9bc2f66.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Everspy Ultimate.exe"C:\Users\Admin\AppData\Local\Temp\Everspy Ultimate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\ProgramData\msedgewebview2.exe"C:\ProgramData\msedgewebview2.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\ACCApi'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn msedgewebview2 /tr "C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe" /st 20:29 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2292
-
-
C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe"C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe"3⤵PID:2344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD552afa702b34ab802e2ecd71d9539c829
SHA16a6f18158c82910e158d7e27972486c6e4dc5c93
SHA256992fefff5236c174b6dd74b76a2c5c0d33470bec786ee4b30f5577aea27b8025
SHA5125e42fead63b34fb62e4173e83e11110543583aece41f736c007d8512e8f23b6713140c9233bf99f9b9d1c3302a2f526bd4d33ed1ce1f777c9e0d9dea25e37639
-
Filesize
9.3MB
MD5b9300ab27727690ac19902167c0c67d5
SHA15cd1d0027d1c10f194bc3ceffee044f961bb08ee
SHA256cc51fc2f78803e025e1b6de6d5aee4beeca3ca50dca085ccda4184e98c29867a
SHA51208a7b316e7c055118e8e24e2f6168384c83094ede751a1bdfc0ff1ce541eb1dabb377f9aaae26e48715e3d08e3a23f275046fee9fe18b69d652c4409eb052c5c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
67KB
MD539f4793e3bd69fde3059e02b84875bef
SHA14ae174ff10e05e7946c6220b2ef7565830596b3c
SHA256eee698d53132459d85ad39ef66c6b33769dbf69469a346a1ea26c13eebfb4102
SHA5124642ba370d794ffc0dac13a84f8ea3501f9a88a0d2584daecbb340b92cce1dd14c46b7d9d5f4a27a60c1365584f995aa7e93fdc70c4775425f5b3590f6eeec50