Analysis

  • max time kernel
    74s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 18:57

General

  • Target

    wefwf.exe

  • Size

    57KB

  • MD5

    ee3d8afb08a2a88928c2b3edaefef4b5

  • SHA1

    7224ca79a5675b2d097b112ac05cd295cfabdb59

  • SHA256

    bd0232d8961ab07c52d33c336b2ae22801537def43785e959eb4982149983b9f

  • SHA512

    1e052b8b72e8912a6917049108df7639983d81b39cce266ef3d45fdef213af3eea585db05050635baf4da4c734f49a7cf544faf0923293ed9fc9c55e6e9f60c6

  • SSDEEP

    1536:regNzd4DXSx6euMSgbqMvdFeUEG6jOqaX:SKzd/Q8TbqKhELOq+

Malware Config

Extracted

Family

xworm

C2

147.185.221.16:40164

147.185.221.20:40164

Attributes
  • install_file

    System Volume Information Prefetch.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\wefwf.exe
    "C:\Users\Admin\AppData\Local\Temp\wefwf.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA715.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:4036
  • C:\Users\Admin\Desktop\Bootstrapper.exe
    "C:\Users\Admin\Desktop\Bootstrapper.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA715.tmp.bat

    Filesize

    157B

    MD5

    15329ff40830288b83bb47b744f0a99b

    SHA1

    27404c2757dfb839c341503357938031604ea650

    SHA256

    9d8ef5f0e9e6c46b591ae07bce0673830189d1d769a007d8eb31e37af5d69836

    SHA512

    c9bb3fb15036f68b90fa7a7ff1dbb64b66364b43fa8a98ddd586104c1c9981108f8fa8e1868d47737cfc215c136d0b958cea128a3ffc3598b0cd3c292aebe26b

  • C:\Users\Admin\Desktop\Bootstrapper.exe

    Filesize

    386KB

    MD5

    abde55608b2a0224319c069bec68c8e9

    SHA1

    a6be09d141540d5528bea5fca09b373c69b91eb5

    SHA256

    8f02b949f2b590d3edd006048254aade7e05b62bb7d40dcb1e8871a8fad2aff8

    SHA512

    5f90a919edc7f8b89347b8e2653c4d0323334398b79a72df67cec92323686a6ac5743df600869bc2cef790db94fcef0ea96b1e9b7f03afa8227e5d2e9a6001cc

  • memory/2108-54-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB

  • memory/2108-53-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB

  • memory/2108-52-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB

  • memory/2108-51-0x0000000000C50000-0x0000000000CB6000-memory.dmp

    Filesize

    408KB

  • memory/2444-4-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB

  • memory/2444-7-0x000000001DEC0000-0x000000001DFDE000-memory.dmp

    Filesize

    1.1MB

  • memory/2444-46-0x000000001C3B0000-0x000000001C3D2000-memory.dmp

    Filesize

    136KB

  • memory/2444-47-0x000000001E920000-0x000000001EC70000-memory.dmp

    Filesize

    3.3MB

  • memory/2444-6-0x000000001E3F0000-0x000000001E918000-memory.dmp

    Filesize

    5.2MB

  • memory/2444-5-0x000000001DC10000-0x000000001DCC0000-memory.dmp

    Filesize

    704KB

  • memory/2444-0-0x00007FFCD1983000-0x00007FFCD1985000-memory.dmp

    Filesize

    8KB

  • memory/2444-3-0x00007FFCD1983000-0x00007FFCD1985000-memory.dmp

    Filesize

    8KB

  • memory/2444-2-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB

  • memory/2444-1-0x0000000000F50000-0x0000000000F64000-memory.dmp

    Filesize

    80KB

  • memory/2444-59-0x00007FFCD1980000-0x00007FFCD2441000-memory.dmp

    Filesize

    10.8MB