Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/10/2024, 12:45
Behavioral task
behavioral1
Sample
2477.exe
Resource
win7-20240903-en
General
-
Target
2477.exe
-
Size
129KB
-
MD5
efc3056fc450ea6e1b5d3e584810a2be
-
SHA1
30d2d99c97d06c9d1a48719e65dbd381cf7fe096
-
SHA256
5cc5def0f3bb96f67f39efa387a6cc5eaefa2499ddab4c8654e04390eaea9aa5
-
SHA512
df04868eac6a924006a814552d713430aae5b638fb0a0178b79b512b8a1bfd50c58d6c209b306fdecdb208e8a5784bc14446e39555fb85437f9cbddf478fa58e
-
SSDEEP
3072:zr8WDrCBZaPgXbXbn/cXVOOZu0eKNDqmFg:Pu/osbr/j0BFg
Malware Config
Extracted
xworm
f8terat.ddns.net:7000
78.70.235.238:7000
-
Install_directory
%Temp%
-
install_file
updater.exe
-
telegram
https://api.telegram.org/bot7084570776:AAHWfPRjpebc_dUAwpwOYQjDqVKGe1YgIxw/sendMessage?chat_id=5456205643
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000015dac-2.dat family_xworm behavioral1/memory/2748-13-0x0000000000920000-0x000000000093C000-memory.dmp family_xworm -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2748 2477.exe -
Loads dropped DLL 2 IoCs
pid Process 2140 2477.exe 2140 2477.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2477.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2477.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 2477.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2477.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 2477.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 2477.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 2477.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 2477.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 2477.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 2477.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 2477.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 2477.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2477.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 2477.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 2477.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2477.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 2477.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2477.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 2477.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 2477.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 2477.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 2477.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 2477.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 2477.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 2477.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 2477.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 2477.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 2477.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 2477.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2477.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2477.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 2477.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2748 2140 2477.exe 30 PID 2140 wrote to memory of 2748 2140 2477.exe 30 PID 2140 wrote to memory of 2748 2140 2477.exe 30 PID 2140 wrote to memory of 2748 2140 2477.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2477.exe"C:\Users\Admin\AppData\Local\Temp\2477.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2477.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2477.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
89KB
MD50ee20a416c4c752806bb696e44e7085e
SHA154dae877a748a236f12f2d0a3eb34c63a8aa7a73
SHA2569ca4695aa52e3bf468c2bfe36ecc105c730157a6927e4d96f5ca148c51534c36
SHA51278f3c7b275893fe55e03cedfa929403b704bcb123f0cb13850cfed002a72cb6a4572ad3e376508e999406d0e408ca32cc65b11a9d7dca48265735a42da85bde7