Overview
overview
10Static
static
10Danger-Mul...ain.py
windows7-x64
3Danger-Mul...ain.py
windows10-2004-x64
3Danger-Mul...11.exe
windows7-x64
7Danger-Mul...11.exe
windows10-2004-x64
8Danger-Mul...px.exe
windows7-x64
10Danger-Mul...px.exe
windows10-2004-x64
10Danger-Mul...rt.bat
windows7-x64
10Danger-Mul...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 11:35
Behavioral task
behavioral1
Sample
Danger-MultiTool-main/src/main.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Danger-MultiTool-main/src/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Danger-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Danger-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Danger-MultiTool-main/src/utils/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Danger-MultiTool-main/src/utils/upx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Danger-MultiTool-main/start.bat
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Danger-MultiTool-main/start.bat
Resource
win10v2004-20240802-en
General
-
Target
Danger-MultiTool-main/start.bat
-
Size
121B
-
MD5
c7bda38ca7b6acff98cfce8e087ece33
-
SHA1
d2d7b7c6757870ef3a7ff3a40678e74176a4676e
-
SHA256
8caedbf5a91ed11823eb4d35ac84720e692246a17db1dd70e42d1565540d5842
-
SHA512
7732f4fb081f71bb0a8545a033ddfc35ec6901aec49735926718466d7155f623c482a83871fc3cb9c18fae17c9ce3ee008ea4effb74cce33b7034b8ad0ad0b7a
Malware Config
Extracted
xworm
45.83.246.140:30120
-
Install_directory
%AppData%
-
install_file
runtime.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral8/memory/2780-1-0x0000000000AC0000-0x0000000000AD8000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runtime.lnk upx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runtime.lnk upx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runtime = "C:\\Users\\Admin\\AppData\\Roaming\\runtime.exe" upx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 upx.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 upx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 upx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4512 OpenWith.exe 2780 upx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1916 1808 cmd.exe 83 PID 1808 wrote to memory of 1916 1808 cmd.exe 83 PID 1808 wrote to memory of 2780 1808 cmd.exe 84 PID 1808 wrote to memory of 2780 1808 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\start.bat"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\mode.commode con: cols=100 lines=302⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\src\utils\upx.exesrc/utils/upx.exe2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4512