Analysis
-
max time kernel
294s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
Luxury Crypter.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Luxury Crypter.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Luxury Crypter.exe
Resource
win10v2004-20240802-en
General
-
Target
Luxury Crypter.exe
-
Size
7.0MB
-
MD5
f52edee9472d973f7aedaa58baed96e6
-
SHA1
dee4734806f0a47e81627a66b2c75e5ec37b6b1a
-
SHA256
56747e2199faa9d6a532d07432f7f784f1ab773bfbae4bc2c4384574c035a260
-
SHA512
1568f66ea43208900e1800ac59946f92d426d05d00783decdce31eb088ec54cd467adf640e5b2a5388f5ee6ccd2840dfe551f9ae18c06b168a469ec18a85ef0b
-
SSDEEP
98304:bmurSHFk4vh9IWa/LP3Nm9Zlxne1uxetbDEgovbddnY6Jy3yH/O:b6m7P3Nm9ZWiADEp5F0R
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000015d36-15.dat family_xworm behavioral2/memory/1708-16-0x0000000000EE0000-0x0000000000EF6000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2400 powershell.exe 2736 powershell.exe 2724 powershell.exe 2592 powershell.exe 1904 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedgewebview2.exe.lnk msedgewebview2.exe -
Executes dropped EXE 5 IoCs
pid Process 2164 Luxury Crypter.exe 1708 svchost.exe 3052 msedgewebview2.exe 2772 msedgewebview2.exe 2220 msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Luxury Crypter.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1112 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1900 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1708 svchost.exe 2772 msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2400 powershell.exe 2736 powershell.exe 2724 powershell.exe 2592 powershell.exe 1708 svchost.exe 1904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1708 svchost.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 1708 svchost.exe Token: SeDebugPrivilege 3052 msedgewebview2.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 2772 msedgewebview2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 svchost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2164 2900 Luxury Crypter.exe 28 PID 2900 wrote to memory of 2164 2900 Luxury Crypter.exe 28 PID 2900 wrote to memory of 2164 2900 Luxury Crypter.exe 28 PID 2900 wrote to memory of 2164 2900 Luxury Crypter.exe 28 PID 2900 wrote to memory of 1708 2900 Luxury Crypter.exe 29 PID 2900 wrote to memory of 1708 2900 Luxury Crypter.exe 29 PID 2900 wrote to memory of 1708 2900 Luxury Crypter.exe 29 PID 1708 wrote to memory of 2400 1708 svchost.exe 30 PID 1708 wrote to memory of 2400 1708 svchost.exe 30 PID 1708 wrote to memory of 2400 1708 svchost.exe 30 PID 2900 wrote to memory of 3052 2900 Luxury Crypter.exe 32 PID 2900 wrote to memory of 3052 2900 Luxury Crypter.exe 32 PID 2900 wrote to memory of 3052 2900 Luxury Crypter.exe 32 PID 1708 wrote to memory of 2736 1708 svchost.exe 33 PID 1708 wrote to memory of 2736 1708 svchost.exe 33 PID 1708 wrote to memory of 2736 1708 svchost.exe 33 PID 1708 wrote to memory of 2724 1708 svchost.exe 35 PID 1708 wrote to memory of 2724 1708 svchost.exe 35 PID 1708 wrote to memory of 2724 1708 svchost.exe 35 PID 1708 wrote to memory of 2592 1708 svchost.exe 37 PID 1708 wrote to memory of 2592 1708 svchost.exe 37 PID 1708 wrote to memory of 2592 1708 svchost.exe 37 PID 3052 wrote to memory of 1904 3052 msedgewebview2.exe 40 PID 3052 wrote to memory of 1904 3052 msedgewebview2.exe 40 PID 3052 wrote to memory of 1904 3052 msedgewebview2.exe 40 PID 3052 wrote to memory of 1900 3052 msedgewebview2.exe 42 PID 3052 wrote to memory of 1900 3052 msedgewebview2.exe 42 PID 3052 wrote to memory of 1900 3052 msedgewebview2.exe 42 PID 3052 wrote to memory of 2772 3052 msedgewebview2.exe 46 PID 3052 wrote to memory of 2772 3052 msedgewebview2.exe 46 PID 3052 wrote to memory of 2772 3052 msedgewebview2.exe 46 PID 3052 wrote to memory of 2904 3052 msedgewebview2.exe 47 PID 3052 wrote to memory of 2904 3052 msedgewebview2.exe 47 PID 3052 wrote to memory of 2904 3052 msedgewebview2.exe 47 PID 2904 wrote to memory of 1112 2904 cmd.exe 49 PID 2904 wrote to memory of 1112 2904 cmd.exe 49 PID 2904 wrote to memory of 1112 2904 cmd.exe 49 PID 904 wrote to memory of 2220 904 taskeng.exe 52 PID 904 wrote to memory of 2220 904 taskeng.exe 52 PID 904 wrote to memory of 2220 904 taskeng.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Luxury Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Luxury Crypter.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Luxury Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Luxury Crypter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\ProgramData\msedgewebview2.exe"C:\ProgramData\msedgewebview2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\ACCApi'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /create /tn msedgewebview2 /tr "C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe" /st 17:57 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1900
-
-
C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe"C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDF09.tmp.cmd""3⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\timeout.exetimeout 64⤵
- Delays execution with timeout.exe
PID:1112
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC017E15-0F6A-44C9-B28F-D996B4A908DF} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exeC:\Users\Admin\AppData\Local\ACCApi\msedgewebview2.exe2⤵
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD59c55d8c0b720f652e4ad3753e9939b99
SHA1ee69da72e65d44638f352791b2114887e2110384
SHA25644a220f92ce2822d3d8e9c7ded429c9e53f650224759c8ec75c49706716fda77
SHA512ea88bcf9b289ef4b2ba34f3b7818aee672867418d4e8fb29d5fac99688e30babfc21a7279151397ef47f8d852b8129ed63a42eec7e1a5bd598c744af9da320b7
-
Filesize
147B
MD56de81bf833c7f1db84a4ec547404e4d1
SHA10373d43f9d1de573b8d41fc68401a0345a40f985
SHA256956f94a9b9ef4cb133374310584a64082a67357453584e4f4283b7b6b83a0db8
SHA512bb6749a368c133469489f389a4c92601d3edbf9fddd6571af3bff1238726dde1b39be8f30c0147b909903c43ed8ea8bf62575cfd8046b1151383da1235792a9e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HKTGCRC0JAOBU91RFUSB.temp
Filesize7KB
MD5ce4cd5361919c2ba61132f2b3490f901
SHA1dd2a8c33770491ca7d9dabd0c0e22b634c41edcc
SHA256e9e86bbad8625448ac1fec082f13978aae452077158575b652a31f58068063cc
SHA5120f08b0de0a6ea781343de0e1d11c2f0682540d4daa9f514183c84bedd727a644f35a408c1f2646b53b607f3fa543d422127fd5801539ee26db8591ac323a7884
-
Filesize
67KB
MD539f4793e3bd69fde3059e02b84875bef
SHA14ae174ff10e05e7946c6220b2ef7565830596b3c
SHA256eee698d53132459d85ad39ef66c6b33769dbf69469a346a1ea26c13eebfb4102
SHA5124642ba370d794ffc0dac13a84f8ea3501f9a88a0d2584daecbb340b92cce1dd14c46b7d9d5f4a27a60c1365584f995aa7e93fdc70c4775425f5b3590f6eeec50