Analysis

  • max time kernel
    93s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 18:57

General

  • Target

    RC7.exe

  • Size

    809KB

  • MD5

    8431fbda6408a7a2d8d954abb46d0012

  • SHA1

    2f268b2a51379762b268f0b208ca48826e623f93

  • SHA256

    befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33

  • SHA512

    e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64

  • SSDEEP

    6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:22612

bay-husband.gl.at.ply.gg:22612

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    WebRuntime.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe
      "C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe

    Filesize

    83KB

    MD5

    83d1ae21a7f05487cc5d62eb83ee9523

    SHA1

    a01e42cb77a9595d08804cea32fc0a69c8de60f5

    SHA256

    17d76f6c81180a48771a369e55e2331cbcde64c3101060cdaf1fd911ff6fc72a

    SHA512

    e9ed64c0c24f142f53064de85d11516a707378178c0688bb0eabd52af29d13b3315beead066512553b275433b56063f98fc67cda0e8ba40f7ef53c7b44f70389

  • memory/4320-29-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

    Filesize

    64KB

  • memory/4320-23-0x0000000000520000-0x000000000053C000-memory.dmp

    Filesize

    112KB

  • memory/4320-22-0x00007FFF4AA43000-0x00007FFF4AA45000-memory.dmp

    Filesize

    8KB

  • memory/4952-3-0x0000000006200000-0x00000000067A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4952-5-0x00000000748D0000-0x0000000075080000-memory.dmp

    Filesize

    7.7MB

  • memory/4952-4-0x0000000005CF0000-0x0000000005D82000-memory.dmp

    Filesize

    584KB

  • memory/4952-0-0x00000000748DE000-0x00000000748DF000-memory.dmp

    Filesize

    4KB

  • memory/4952-2-0x0000000005830000-0x0000000005B4C000-memory.dmp

    Filesize

    3.1MB

  • memory/4952-24-0x0000000007210000-0x000000000721A000-memory.dmp

    Filesize

    40KB

  • memory/4952-25-0x0000000007220000-0x000000000722A000-memory.dmp

    Filesize

    40KB

  • memory/4952-26-0x0000000005800000-0x0000000005810000-memory.dmp

    Filesize

    64KB

  • memory/4952-28-0x00000000748D0000-0x0000000075080000-memory.dmp

    Filesize

    7.7MB

  • memory/4952-1-0x0000000000A80000-0x0000000000B50000-memory.dmp

    Filesize

    832KB