Analysis

  • max time kernel
    30s
  • max time network
    142s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-10-2024 18:51

General

  • Target

    RC7.exe

  • Size

    809KB

  • MD5

    8431fbda6408a7a2d8d954abb46d0012

  • SHA1

    2f268b2a51379762b268f0b208ca48826e623f93

  • SHA256

    befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33

  • SHA512

    e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64

  • SSDEEP

    6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:22612

bay-husband.gl.at.ply.gg:22612

Attributes
  • Install_directory

    %AppData%

  • install_file

    WebRuntime.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe
      "C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe

    Filesize

    66KB

    MD5

    57d1cfd1a2f8d248c6e18c903127452a

    SHA1

    746dc1af18c021dd5c9f8446155f75b891381f37

    SHA256

    4fd418e12de833bd0bfc5ec23ebbe5f37e12f0e40b96613a53ba013221f1915b

    SHA512

    8aef885aec60c0f6bb0b9df9f3ddb194e39e0afc025f46767272b711bf0aeac1e186ee47fd70b07ce575e9feca88f38157ac2c92f7de3c80532845921165ec36

  • memory/1640-3-0x0000000006160000-0x0000000006706000-memory.dmp

    Filesize

    5.6MB

  • memory/1640-2-0x00000000056C0000-0x00000000059DC000-memory.dmp

    Filesize

    3.1MB

  • memory/1640-0-0x00000000742EE000-0x00000000742EF000-memory.dmp

    Filesize

    4KB

  • memory/1640-4-0x00000000059E0000-0x0000000005A72000-memory.dmp

    Filesize

    584KB

  • memory/1640-5-0x00000000742E0000-0x0000000074A91000-memory.dmp

    Filesize

    7.7MB

  • memory/1640-1-0x00000000006D0000-0x00000000007A0000-memory.dmp

    Filesize

    832KB

  • memory/1640-24-0x0000000006DD0000-0x0000000006DDA000-memory.dmp

    Filesize

    40KB

  • memory/1640-25-0x0000000006DE0000-0x0000000006DEA000-memory.dmp

    Filesize

    40KB

  • memory/1640-26-0x0000000005BA0000-0x0000000005BB0000-memory.dmp

    Filesize

    64KB

  • memory/1640-29-0x00000000742E0000-0x0000000074A91000-memory.dmp

    Filesize

    7.7MB

  • memory/2856-22-0x00007FFDAEE53000-0x00007FFDAEE55000-memory.dmp

    Filesize

    8KB

  • memory/2856-23-0x0000000000DE0000-0x0000000000DF6000-memory.dmp

    Filesize

    88KB

  • memory/2856-28-0x000000001BCF0000-0x000000001BD00000-memory.dmp

    Filesize

    64KB