Overview
overview
10Static
static
3AlphaBlendTextBox.dll
windows7-x64
1AlphaBlendTextBox.dll
windows10-2004-x64
1Aspose.Zip.dll
windows7-x64
1Aspose.Zip.dll
windows10-2004-x64
1Bunifu_UI_v1.5.3.dll
windows7-x64
1Bunifu_UI_v1.5.3.dll
windows10-2004-x64
1RC7.exe
windows7-x64
10RC7.exe
windows10-2004-x64
10System.Run...fe.dll
windows7-x64
1System.Run...fe.dll
windows10-2004-x64
1System.Tex...es.dll
windows7-x64
1System.Tex...es.dll
windows10-2004-x64
1bin/Monaco.html
windows7-x64
3bin/Monaco.html
windows10-2004-x64
3bin/MonacoEditor.html
windows7-x64
3bin/MonacoEditor.html
windows10-2004-x64
3bin/vs/bas...ain.js
windows7-x64
3bin/vs/bas...ain.js
windows10-2004-x64
3bin/vs/bas...bat.js
windows7-x64
3bin/vs/bas...bat.js
windows10-2004-x64
3bin/vs/bas...fee.js
windows7-x64
3bin/vs/bas...fee.js
windows10-2004-x64
3bin/vs/bas...cpp.js
windows7-x64
3bin/vs/bas...cpp.js
windows10-2004-x64
3bin/vs/bas...arp.js
windows7-x64
3bin/vs/bas...arp.js
windows10-2004-x64
3bin/vs/bas...csp.js
windows7-x64
3bin/vs/bas...csp.js
windows10-2004-x64
3bin/vs/bas...css.js
windows7-x64
3bin/vs/bas...css.js
windows10-2004-x64
3bin/vs/bas...ile.js
windows7-x64
3bin/vs/bas...ile.js
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
AlphaBlendTextBox.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AlphaBlendTextBox.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Aspose.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Aspose.Zip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Bunifu_UI_v1.5.3.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RC7.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RC7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
System.Text.Encoding.CodePages.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
System.Text.Encoding.CodePages.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
bin/Monaco.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
bin/Monaco.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
bin/MonacoEditor.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
bin/MonacoEditor.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bin/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
bin/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
bin/vs/basic-languages/css/css.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
bin/vs/basic-languages/css/css.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10v2004-20240802-en
General
-
Target
RC7.exe
-
Size
809KB
-
MD5
8431fbda6408a7a2d8d954abb46d0012
-
SHA1
2f268b2a51379762b268f0b208ca48826e623f93
-
SHA256
befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33
-
SHA512
e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64
-
SSDEEP
6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT
Malware Config
Extracted
xworm
127.0.0.1:22612
bay-husband.gl.at.ply.gg:22612
-
Install_directory
%ProgramData%
-
install_file
WebRuntime.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral7/files/0x000400000001cb8f-10.dat family_xworm behavioral7/memory/2492-17-0x0000000001220000-0x000000000123C000-memory.dmp family_xworm -
Executes dropped EXE 1 IoCs
pid Process 2492 Temp.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 RC7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RC7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RC7.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main RC7.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl RC7.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RC7.exe = "11001" RC7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2276 RC7.exe Token: SeDebugPrivilege 2492 Temp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2492 2276 RC7.exe 31 PID 2276 wrote to memory of 2492 2276 RC7.exe 31 PID 2276 wrote to memory of 2492 2276 RC7.exe 31 PID 2276 wrote to memory of 2492 2276 RC7.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC7.exe"C:\Users\Admin\AppData\Local\Temp\RC7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD583d1ae21a7f05487cc5d62eb83ee9523
SHA1a01e42cb77a9595d08804cea32fc0a69c8de60f5
SHA25617d76f6c81180a48771a369e55e2331cbcde64c3101060cdaf1fd911ff6fc72a
SHA512e9ed64c0c24f142f53064de85d11516a707378178c0688bb0eabd52af29d13b3315beead066512553b275433b56063f98fc67cda0e8ba40f7ef53c7b44f70389