Overview
overview
10Static
static
3AlphaBlendTextBox.dll
windows11-21h2-x64
10Aspose.Zip.dll
windows11-21h2-x64
1Bunifu_UI_v1.5.3.dll
windows11-21h2-x64
1RC7.exe
windows11-21h2-x64
10System.Run...fe.dll
windows11-21h2-x64
1System.Tex...es.dll
windows11-21h2-x64
1bin/Monaco.html
windows11-21h2-x64
3bin/MonacoEditor.html
windows11-21h2-x64
3bin/vs/bas...ain.js
windows11-21h2-x64
3bin/vs/bas...bat.js
windows11-21h2-x64
3bin/vs/bas...fee.js
windows11-21h2-x64
3bin/vs/bas...cpp.js
windows11-21h2-x64
3bin/vs/bas...arp.js
windows11-21h2-x64
3bin/vs/bas...csp.js
windows11-21h2-x64
3bin/vs/bas...css.js
windows11-21h2-x64
3bin/vs/bas...ile.js
windows11-21h2-x64
3bin/vs/bas...arp.js
windows11-21h2-x64
3bin/vs/bas.../go.js
windows11-21h2-x64
3bin/vs/bas...ars.js
windows11-21h2-x64
3bin/vs/bas...tml.js
windows11-21h2-x64
3bin/vs/bas...ini.js
windows11-21h2-x64
3bin/vs/bas...ava.js
windows11-21h2-x64
3bin/vs/bas...ess.js
windows11-21h2-x64
3bin/vs/bas...lua.js
windows11-21h2-x64
3bin/vs/bas...own.js
windows11-21h2-x64
3bin/vs/bas...dax.js
windows11-21h2-x64
3bin/vs/bas...sql.js
windows11-21h2-x64
3bin/vs/bas...e-c.js
windows11-21h2-x64
3bin/vs/bas...sql.js
windows11-21h2-x64
3bin/vs/bas...php.js
windows11-21h2-x64
3bin/vs/bas...ats.js
windows11-21h2-x64
3bin/vs/bas...ell.js
windows11-21h2-x64
3Analysis
-
max time kernel
30s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-10-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
AlphaBlendTextBox.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Aspose.Zip.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Bunifu_UI_v1.5.3.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
RC7.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
System.Text.Encoding.CodePages.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
bin/Monaco.html
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
bin/MonacoEditor.html
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
bin/vs/base/worker/workerMain.js
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
bin/vs/basic-languages/css/css.js
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
bin/vs/basic-languages/fsharp/fsharp.js
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
bin/vs/basic-languages/go/go.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
bin/vs/basic-languages/handlebars/handlebars.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
bin/vs/basic-languages/html/html.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
bin/vs/basic-languages/ini/ini.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
bin/vs/basic-languages/java/java.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
bin/vs/basic-languages/less/less.js
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
bin/vs/basic-languages/lua/lua.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
bin/vs/basic-languages/markdown/markdown.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
bin/vs/basic-languages/msdax/msdax.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
bin/vs/basic-languages/mysql/mysql.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
bin/vs/basic-languages/objective-c/objective-c.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
bin/vs/basic-languages/pgsql/pgsql.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
bin/vs/basic-languages/php/php.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
bin/vs/basic-languages/postiats/postiats.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
bin/vs/basic-languages/powershell/powershell.js
Resource
win11-20240802-en
General
-
Target
RC7.exe
-
Size
809KB
-
MD5
8431fbda6408a7a2d8d954abb46d0012
-
SHA1
2f268b2a51379762b268f0b208ca48826e623f93
-
SHA256
befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33
-
SHA512
e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64
-
SSDEEP
6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT
Malware Config
Extracted
xworm
127.0.0.1:22612
bay-husband.gl.at.ply.gg:22612
-
Install_directory
%AppData%
-
install_file
WebRuntime.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral4/files/0x000100000002abc0-12.dat family_xworm behavioral4/memory/2856-23-0x0000000000DE0000-0x0000000000DF6000-memory.dmp family_xworm -
Executes dropped EXE 1 IoCs
pid Process 2856 Temp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RC7.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RC7.exe = "11001" RC7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1640 RC7.exe Token: SeDebugPrivilege 2856 Temp.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2856 1640 RC7.exe 78 PID 1640 wrote to memory of 2856 1640 RC7.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC7.exe"C:\Users\Admin\AppData\Local\Temp\RC7.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD557d1cfd1a2f8d248c6e18c903127452a
SHA1746dc1af18c021dd5c9f8446155f75b891381f37
SHA2564fd418e12de833bd0bfc5ec23ebbe5f37e12f0e40b96613a53ba013221f1915b
SHA5128aef885aec60c0f6bb0b9df9f3ddb194e39e0afc025f46767272b711bf0aeac1e186ee47fd70b07ce575e9feca88f38157ac2c92f7de3c80532845921165ec36