Analysis
-
max time kernel
123s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 11:19
Behavioral task
behavioral1
Sample
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe
Resource
win7-20240903-en
General
-
Target
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe
-
Size
86KB
-
MD5
de16a00b42e978595cbd917d10ceb984
-
SHA1
fccc091d3ab6b4c26449e3a4ad0bc5eda73b6a7c
-
SHA256
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78
-
SHA512
aea3e18957bb3edbcf6a08fc43ed0e7792cfcd5a3c1a4b8a017b92e0467129a3879d3282ef73b505e49440fb34f294fc7c50712f6c8bd11b55d710004fed3122
-
SSDEEP
1536:EW8TIhv1Cz1WeVB/afL8IT+DQX9Ea+bnJEsmTtjD0H6JVapKVX5OwoKxA35:ER0Z1VhLTFr+bn2z1D0OVacJOXKK
Malware Config
Extracted
xworm
80.133.88.87:8848
-
Install_directory
%AppData%
-
install_file
BrowserUpdater.exe
-
telegram
https://api.telegram.org/bot7409084272:AAGfvawizs5psSM16en9CLFzI0ZQnCNB3SA
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2692-1-0x0000000000F30000-0x0000000000F4C000-memory.dmp family_xworm behavioral1/files/0x000a0000000120cd-32.dat family_xworm behavioral1/memory/2952-34-0x0000000001160000-0x000000000117C000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2820 powershell.exe 2912 powershell.exe 2624 powershell.exe 1048 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2952 BrowserUpdater.exe 1700 BrowserUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2820 powershell.exe 2912 powershell.exe 2624 powershell.exe 1048 powershell.exe 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe Token: SeDebugPrivilege 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe Token: SeDebugPrivilege 2952 BrowserUpdater.exe Token: SeDebugPrivilege 1700 BrowserUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2820 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 30 PID 2692 wrote to memory of 2820 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 30 PID 2692 wrote to memory of 2820 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 30 PID 2692 wrote to memory of 2912 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 32 PID 2692 wrote to memory of 2912 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 32 PID 2692 wrote to memory of 2912 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 32 PID 2692 wrote to memory of 2624 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 34 PID 2692 wrote to memory of 2624 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 34 PID 2692 wrote to memory of 2624 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 34 PID 2692 wrote to memory of 1048 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 36 PID 2692 wrote to memory of 1048 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 36 PID 2692 wrote to memory of 1048 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 36 PID 2692 wrote to memory of 2900 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 38 PID 2692 wrote to memory of 2900 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 38 PID 2692 wrote to memory of 2900 2692 dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe 38 PID 328 wrote to memory of 2952 328 taskeng.exe 42 PID 328 wrote to memory of 2952 328 taskeng.exe 42 PID 328 wrote to memory of 2952 328 taskeng.exe 42 PID 328 wrote to memory of 1700 328 taskeng.exe 44 PID 328 wrote to memory of 1700 328 taskeng.exe 44 PID 328 wrote to memory of 1700 328 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe"C:\Users\Admin\AppData\Local\Temp\dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\BrowserUpdater.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BrowserUpdater.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "BrowserUpdater" /tr "C:\Users\Admin\AppData\Roaming\BrowserUpdater.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {54CE04D4-A67C-4AE0-B174-037417985F74} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Roaming\BrowserUpdater.exeC:\Users\Admin\AppData\Roaming\BrowserUpdater.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Roaming\BrowserUpdater.exeC:\Users\Admin\AppData\Roaming\BrowserUpdater.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5de16a00b42e978595cbd917d10ceb984
SHA1fccc091d3ab6b4c26449e3a4ad0bc5eda73b6a7c
SHA256dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78
SHA512aea3e18957bb3edbcf6a08fc43ed0e7792cfcd5a3c1a4b8a017b92e0467129a3879d3282ef73b505e49440fb34f294fc7c50712f6c8bd11b55d710004fed3122
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d5d9ef40d1dd431088c051d1773dfa51
SHA16a2f1337812e88885cd6653824e0eb543d41e687
SHA25630ea3dcd6f44e0f22d9c8c045e9b24043b22a31d44e7970a758389dbb22813f2
SHA51204b79270e2ed0046c81afa846c7e5e0553f0efa871e56ccb6ceec3b419779326316b8b3ab98c7a6318069c7a32ff5298070606689c0a1d1d3694dbce54d7306d