Analysis

  • max time kernel
    68s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2024 10:10

Errors

Reason
Machine shutdown

General

  • Target

    BootstrapperV18.exe

  • Size

    67KB

  • MD5

    3f194cb392261195f6354bfefacc8df6

  • SHA1

    35ed93df509fb3b34cdcd6f39c645a8bc9bc63e5

  • SHA256

    b97e386e681f0aa6c3ffb15d972dfb7aed7b3ea5711d6e105850800a9688643e

  • SHA512

    f08bd41e4ed678f6ad315e0ef843110bc03c239b9b4f7bc3c45e3b5f1f16dde791b86cbb7289f1da962047605287c3e1d0da678572836f7965b2d42c595250e2

  • SSDEEP

    1536:I06pVXzKc2nHLPdKLi/5F26T15TkbOLmobtO7hKD:I0BLnrMLi/O6TTkbOL7btO7ID

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:4087

series-transition.gl.at.ply.gg:4087

Attributes
  • Install_directory

    %AppData%

  • install_file

    explorer.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV18.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperV18.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\Admin\AppData\Roaming\explorer.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3628
    • C:\Users\Admin\AppData\Local\Temp\cgbtnz.exe
      "C:\Users\Admin\AppData\Local\Temp\cgbtnz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1560
    • C:\Users\Admin\AppData\Local\Temp\rjhwdi.exe
      "C:\Users\Admin\AppData\Local\Temp\rjhwdi.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of AdjustPrivilegeToken
      PID:4968
  • C:\Users\Admin\AppData\Roaming\explorer.exe
    C:\Users\Admin\AppData\Roaming\explorer.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cgbtnz.exe

    Filesize

    229KB

    MD5

    624eebb7053bf8a9f6b274682544c450

    SHA1

    1cff5f51c75bd64c46fddabbca26c62e34d42c97

    SHA256

    e82773cc163b4e8c62626e0d5691733e75abe27e80e57c697fbee5fe8d67149f

    SHA512

    0824828b680de1a7d3a2ba75db6fd8138275bd69127fdc450e020186dac6eceb781e8e36bb0bbc6408b7a1d5b8c0077945753f2a7a1ba196eed0e096bd6bd8a1

  • C:\Users\Admin\AppData\Local\Temp\rjhwdi.exe

    Filesize

    225KB

    MD5

    af2379cc4d607a45ac44d62135fb7015

    SHA1

    39b6d40906c7f7f080e6befa93324dddadcbd9fa

    SHA256

    26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

    SHA512

    69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

  • C:\Users\Admin\AppData\Roaming\explorer.exe

    Filesize

    67KB

    MD5

    3f194cb392261195f6354bfefacc8df6

    SHA1

    35ed93df509fb3b34cdcd6f39c645a8bc9bc63e5

    SHA256

    b97e386e681f0aa6c3ffb15d972dfb7aed7b3ea5711d6e105850800a9688643e

    SHA512

    f08bd41e4ed678f6ad315e0ef843110bc03c239b9b4f7bc3c45e3b5f1f16dde791b86cbb7289f1da962047605287c3e1d0da678572836f7965b2d42c595250e2

  • memory/2780-0-0x00007FF8DA9F3000-0x00007FF8DA9F5000-memory.dmp

    Filesize

    8KB

  • memory/2780-1-0x0000000000630000-0x0000000000648000-memory.dmp

    Filesize

    96KB

  • memory/2780-6-0x00007FF8DA9F0000-0x00007FF8DB4B1000-memory.dmp

    Filesize

    10.8MB

  • memory/2780-7-0x00007FF8DA9F0000-0x00007FF8DB4B1000-memory.dmp

    Filesize

    10.8MB

  • memory/2780-11-0x000000001BE80000-0x000000001BE8C000-memory.dmp

    Filesize

    48KB

  • memory/2780-14-0x000000001C990000-0x000000001C99E000-memory.dmp

    Filesize

    56KB

  • memory/3076-26-0x0000017454140000-0x0000017454180000-memory.dmp

    Filesize

    256KB

  • memory/3272-10-0x00007FF8DA9F0000-0x00007FF8DB4B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3272-13-0x00007FF8DA9F0000-0x00007FF8DB4B1000-memory.dmp

    Filesize

    10.8MB