Analysis

  • max time kernel
    143s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 22:21

General

  • Target

    1b99f0bf9216a89b8320e63cbd18a292.exe

  • Size

    1.3MB

  • MD5

    1b99f0bf9216a89b8320e63cbd18a292

  • SHA1

    6a199cb43cb4f808183918ddb6eadc760f7cb680

  • SHA256

    5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357

  • SHA512

    02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382

  • SSDEEP

    24576:J64p16BppRskYGC/cJUE7P6nxhpBaTn+CC6YtGz:JzpEBrRb4MonrpATDcUz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.219.239.11:6969

Mutex

QMHDjhLW52nOcp4a

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot5372344229:AAEM46DF5hWBLPbN5UErJaoJvlNvm-ZJXyg

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b99f0bf9216a89b8320e63cbd18a292.exe
    "C:\Users\Admin\AppData\Local\Temp\1b99f0bf9216a89b8320e63cbd18a292.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
    • C:\Users\Admin\AppData\Local\Temp\xnbukd.exe
      "C:\Users\Admin\AppData\Local\Temp\xnbukd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d5czobiz.zn1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\xnbukd.exe

    Filesize

    146KB

    MD5

    34fb99630bab94b3cbf92c1c6dec493f

    SHA1

    d6cc3d729e7971f7144f902d482f723ddd77cad8

    SHA256

    f2e2e2e4b066e98a05012853f4fabf37e04b9c5dc18d8341cc98b145f9a7f12a

    SHA512

    62bfc6a7fb0d895907da815859e7d118b16de33111210443a745b0cb9d11db82bd0531efef8503266c1269a037153794ea52bc2ce70a127389fce0e5ac4d9fcf

  • memory/2100-1126-0x0000000000590000-0x00000000005BA000-memory.dmp

    Filesize

    168KB

  • memory/3452-33-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-67-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-11-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-15-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-13-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-55-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-17-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-65-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-63-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-61-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-59-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-57-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-53-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-51-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-49-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-47-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-45-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-44-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-41-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-38-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-36-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-32-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-29-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-25-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-24-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-19-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-27-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-2-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-39-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-3-0x00000279F8B20000-0x00000279F8C26000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-21-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-9-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-7-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-5-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-4-0x00000279F8B20000-0x00000279F8C21000-memory.dmp

    Filesize

    1.0MB

  • memory/3452-1078-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1079-0x00000279F8A20000-0x00000279F8AA0000-memory.dmp

    Filesize

    512KB

  • memory/3452-1080-0x00000279F8AA0000-0x00000279F8AEC000-memory.dmp

    Filesize

    304KB

  • memory/3452-1083-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1085-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1086-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1104-0x00000279F9040000-0x00000279F9094000-memory.dmp

    Filesize

    336KB

  • memory/3452-1108-0x00000279F9110000-0x00000279F913C000-memory.dmp

    Filesize

    176KB

  • memory/3452-1109-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1110-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1167-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1112-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1111-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1113-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-1115-0x00000279F9460000-0x00000279F946E000-memory.dmp

    Filesize

    56KB

  • memory/3452-1-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-0-0x00000279F6330000-0x00000279F647A000-memory.dmp

    Filesize

    1.3MB

  • memory/3452-1127-0x00000279FA180000-0x00000279FA2A0000-memory.dmp

    Filesize

    1.1MB

  • memory/3452-1137-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3908-1090-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3908-1089-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3908-1088-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB

  • memory/3908-1096-0x0000028820940000-0x0000028820962000-memory.dmp

    Filesize

    136KB

  • memory/3908-1103-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

    Filesize

    2.0MB