General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
xworm
3.0
spain-trail.gl.at.ply.gg:51770
q2KqNRza4QGi0rMH
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
xworm
5.0
greater-thoughts.gl.at.ply.gg:45129
1nTu2dtHQwobJZ3T
-
Install_directory
%AppData%
-
install_file
svart.exe
Extracted
umbral
https://discord.com/api/webhooks/1290029641578578002/m1fVsUigNqnmg9qL11KB2Dp0cwdGriuTSOUVDC73kL7e21WxRUV92BT2hxAtiAnCrbXG
Targets
-
-
Target
https://mega.nz/file/7cdxFK4L#Io2Hue4hwSOKhugcwhvAvNvz7ViKQqmBYX7YynYEe58
-
Detect Umbral payload
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1