Overview
overview
10Static
static
3AlphaBlendTextBox.dll
windows7-x64
1AlphaBlendTextBox.dll
windows10-2004-x64
1Aspose.Zip.dll
windows7-x64
1Aspose.Zip.dll
windows10-2004-x64
1Bunifu_UI_v1.5.3.dll
windows7-x64
1Bunifu_UI_v1.5.3.dll
windows10-2004-x64
1RC7.exe
windows7-x64
10RC7.exe
windows10-2004-x64
10System.Run...fe.dll
windows7-x64
1System.Run...fe.dll
windows10-2004-x64
1System.Tex...es.dll
windows7-x64
1System.Tex...es.dll
windows10-2004-x64
1bin/Monaco.html
windows7-x64
3bin/Monaco.html
windows10-2004-x64
3bin/MonacoEditor.html
windows7-x64
3bin/MonacoEditor.html
windows10-2004-x64
3bin/vs/bas...ain.js
windows7-x64
3bin/vs/bas...ain.js
windows10-2004-x64
3bin/vs/bas...bat.js
windows7-x64
3bin/vs/bas...bat.js
windows10-2004-x64
3bin/vs/bas...fee.js
windows7-x64
3bin/vs/bas...fee.js
windows10-2004-x64
3bin/vs/bas...cpp.js
windows7-x64
3bin/vs/bas...cpp.js
windows10-2004-x64
3bin/vs/bas...arp.js
windows7-x64
3bin/vs/bas...arp.js
windows10-2004-x64
3bin/vs/bas...csp.js
windows7-x64
3bin/vs/bas...csp.js
windows10-2004-x64
3bin/vs/bas...css.js
windows7-x64
3bin/vs/bas...css.js
windows10-2004-x64
3bin/vs/bas...ile.js
windows7-x64
3bin/vs/bas...ile.js
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
AlphaBlendTextBox.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AlphaBlendTextBox.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Aspose.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Aspose.Zip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Bunifu_UI_v1.5.3.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RC7.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RC7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
System.Text.Encoding.CodePages.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
System.Text.Encoding.CodePages.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
bin/Monaco.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
bin/Monaco.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
bin/MonacoEditor.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
bin/MonacoEditor.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bin/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
bin/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
bin/vs/basic-languages/css/css.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
bin/vs/basic-languages/css/css.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10v2004-20240802-en
General
-
Target
RC7.exe
-
Size
809KB
-
MD5
8431fbda6408a7a2d8d954abb46d0012
-
SHA1
2f268b2a51379762b268f0b208ca48826e623f93
-
SHA256
befedb8dcf588b42acd2db96dc71d82df5da67821b0b3403098de3b77e345b33
-
SHA512
e25bf48f70bad66c48095514444f64717aea8c14228519e76a6d0280cef2458af513f68d26fc11bb4599e125acd9d88c8af0092cc20d11434b97b2de5e5fad64
-
SSDEEP
6144:gbK5rCbsIg2mvqvUOCbsIg2mvqvUzwvIJVLfsMT:DMbsIg2mCvUPbsIg2mCvUztVLfRT
Malware Config
Extracted
xworm
127.0.0.1:22612
bay-husband.gl.at.ply.gg:22612
-
Install_directory
%ProgramData%
-
install_file
WebRuntime.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe family_xworm behavioral8/memory/4320-23-0x0000000000520000-0x000000000053C000-memory.dmp family_xworm -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RC7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation RC7.exe -
Executes dropped EXE 1 IoCs
Processes:
Temp.exepid process 4320 Temp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RC7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RC7.exe -
Processes:
RC7.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RC7.exe = "11001" RC7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RC7.exeTemp.exedescription pid process Token: SeDebugPrivilege 4952 RC7.exe Token: SeDebugPrivilege 4320 Temp.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
RC7.exedescription pid process target process PID 4952 wrote to memory of 4320 4952 RC7.exe Temp.exe PID 4952 wrote to memory of 4320 4952 RC7.exe Temp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC7.exe"C:\Users\Admin\AppData\Local\Temp\RC7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"C:\Users\Admin\AppData\Local\Temp\Extracted\Temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD583d1ae21a7f05487cc5d62eb83ee9523
SHA1a01e42cb77a9595d08804cea32fc0a69c8de60f5
SHA25617d76f6c81180a48771a369e55e2331cbcde64c3101060cdaf1fd911ff6fc72a
SHA512e9ed64c0c24f142f53064de85d11516a707378178c0688bb0eabd52af29d13b3315beead066512553b275433b56063f98fc67cda0e8ba40f7ef53c7b44f70389