Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 18:57

General

  • Target

    RC7.exe

  • Size

    809KB

  • MD5

    8431fbda6408a7a2d8d954abb46d0012

  • SHA1

    2f268b2a51379762b268f0b208ca48826e623f93

  • SHA256

    befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33

  • SHA512

    e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64

  • SSDEEP

    6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:22612

bay-husband.gl.at.ply.gg:22612

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    WebRuntime.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe
      "C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe

    Filesize

    83KB

    MD5

    83d1ae21a7f05487cc5d62eb83ee9523

    SHA1

    a01e42cb77a9595d08804cea32fc0a69c8de60f5

    SHA256

    17d76f6c81180a48771a369e55e2331cbcde64c3101060cdaf1fd911ff6fc72a

    SHA512

    e9ed64c0c24f142f53064de85d11516a707378178c0688bb0eabd52af29d13b3315beead066512553b275433b56063f98fc67cda0e8ba40f7ef53c7b44f70389

  • memory/2276-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

    Filesize

    4KB

  • memory/2276-1-0x00000000010D0000-0x00000000011A0000-memory.dmp

    Filesize

    832KB

  • memory/2276-2-0x00000000049F0000-0x0000000004D0C000-memory.dmp

    Filesize

    3.1MB

  • memory/2276-3-0x0000000074D60000-0x000000007544E000-memory.dmp

    Filesize

    6.9MB

  • memory/2276-15-0x0000000004950000-0x000000000495A000-memory.dmp

    Filesize

    40KB

  • memory/2276-18-0x0000000005430000-0x0000000005470000-memory.dmp

    Filesize

    256KB

  • memory/2276-19-0x0000000074D60000-0x000000007544E000-memory.dmp

    Filesize

    6.9MB

  • memory/2492-16-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

    Filesize

    4KB

  • memory/2492-17-0x0000000001220000-0x000000000123C000-memory.dmp

    Filesize

    112KB

  • memory/2492-20-0x000000001AFA0000-0x000000001B020000-memory.dmp

    Filesize

    512KB