Malware Analysis Report

2024-12-06 03:22

Sample ID 241026-netrdatdnc
Target HG7dj4_Receipt.zip
SHA256 5acd33e1e58647897cd7897305eec80d6c9228ec2fce8f972825b48ea16a8c74
Tags
guloader xworm discovery downloader persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5acd33e1e58647897cd7897305eec80d6c9228ec2fce8f972825b48ea16a8c74

Threat Level: Known bad

The file HG7dj4_Receipt.zip was found to be: Known bad.

Malicious Activity Summary

guloader xworm discovery downloader persistence rat trojan

Guloader family

Xworm family

Detect Xworm Payload

Xworm

Guloader,Cloudeye

Blocklisted process makes network request

Downloads MZ/PE file

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Drops file in System32 directory

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of NtCreateThreadExHideFromDebugger

Enumerates physical storage devices

System Location Discovery: System Language Discovery

NSIS installer

Script User-Agent

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-26 11:19

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-26 11:19

Reported

2024-10-26 11:21

Platform

win7-20240903-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c56D7_Receipt.vbs"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\WScript.exe N/A
N/A N/A C:\Windows\System32\WScript.exe N/A

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c56D7_Receipt.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 apslline.com udp
IN 103.53.40.62:443 apslline.com tcp
IN 103.53.40.62:443 apslline.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-26 11:19

Reported

2024-10-26 11:21

Platform

win10v2004-20241007-en

Max time kernel

146s

Max time network

148s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c56D7_Receipt.vbs"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Guloader family

guloader

Guloader,Cloudeye

downloader guloader

Xworm

trojan rat xworm

Xworm family

xworm

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\WScript.exe N/A

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Windows\System32\WScript.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A
N/A N/A C:\ProgramData\filaucioso.bat N/A
N/A N/A C:\ProgramData\filaucioso.bat N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Unsurveyable197\\Busaos.pif" C:\ProgramData\filaucioso.bat N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\traveskoen.ini C:\ProgramData\filaucioso.bat N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A
N/A N/A C:\ProgramData\filaucioso.bat N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3404 set thread context of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\ProgramData\filaucioso.bat N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\ProgramData\filaucioso.bat N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\ProgramData\filaucioso.bat N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\ProgramData\filaucioso.bat N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2904 wrote to memory of 3404 N/A C:\Windows\System32\WScript.exe C:\ProgramData\filaucioso.bat
PID 2904 wrote to memory of 3404 N/A C:\Windows\System32\WScript.exe C:\ProgramData\filaucioso.bat
PID 2904 wrote to memory of 3404 N/A C:\Windows\System32\WScript.exe C:\ProgramData\filaucioso.bat
PID 3404 wrote to memory of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat
PID 3404 wrote to memory of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat
PID 3404 wrote to memory of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat
PID 3404 wrote to memory of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat
PID 3404 wrote to memory of 3820 N/A C:\ProgramData\filaucioso.bat C:\ProgramData\filaucioso.bat

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c56D7_Receipt.vbs"

C:\ProgramData\filaucioso.bat

"C:\ProgramData\filaucioso.bat"

C:\ProgramData\filaucioso.bat

"C:\ProgramData\filaucioso.bat"

Network

Country Destination Domain Proto
US 8.8.8.8:53 apslline.com udp
IN 103.53.40.62:443 apslline.com tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 62.40.53.103.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
IN 103.53.40.62:443 apslline.com tcp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.18.190.73:80 r10.o.lencr.org tcp
US 8.8.8.8:53 61.45.26.184.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 xwor3july.duckdns.org udp
US 12.221.146.138:9402 xwor3july.duckdns.org tcp
US 8.8.8.8:53 138.146.221.12.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

C:\ProgramData\filaucioso.bat

MD5 f3a3332b13baa50c41644b86efdf0fe4
SHA1 f3b91aa55b8dce62cb614e2a43d8e3973b1d47b6
SHA256 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970
SHA512 46808e4d79d0d1fbe2835456daf31e0de9e8f296b7863f38400eaa03fbf33be450f92df16f9b77ac5bb95aa33a97d484c1c678891c6e13b151f9cb7865c99be7

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 cf7be2840455491f249648c44a1dc759
SHA1 9863c7f04f9d674365fe23f257ba43447f985e8e
SHA256 769c7c2ec9413a771a2f497862194dfb0200452f3a20f5e1f77ad0b6ae535697
SHA512 83984674c9e337bda5ac88c3b2d0e426fd9051e1585b95ea99b3c569ace50900f811e664da9cf426f080837e2b48a5709003b7e5d25382a1ad90026b40777abd

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 b93641813851b1ad166b8163e5aeddc9
SHA1 642d989ceea62bcfd70fb74f3c62ade0c1c41d78
SHA256 1628c6bee5afc85044309f45e34190bc9ce8bd9516e30792460e14362657d42d
SHA512 eee31a0d51df3a7ba35ab4025f8d458c4d12b6f46412982ad34aef31d9e83c7070056a07777ed4b62fb3b92b376b618099374901ffe4f988fe0f853a0e57c8ec

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 2490402a1d7d19949dd2a237b95af06f
SHA1 9a960e98c750e3fc7e44cdd6e1af20e690d893b1
SHA256 bb92b5197bb4677950b78f816a8170797d0392af55e31d0f0744fe9c99f7e9b8
SHA512 f3d299910eee8e8ace51ae3e7d79d12f7f68bfbcdaa0d7b8b66d505c4bdba7d95a97aeefc9f22868989115a99f81e0e3e9480e0d3e9af5fa27d2d9b0e961b52e

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 056fd9e747f45f72c12ed185db65ca8f
SHA1 96b9e5254b0c249a3393008a3fb160b18319532b
SHA256 b46a1b647cd0ac5d5ed27381e1559a8ed6244c5bb7a0d27a41ab1784c40bef85
SHA512 93f9577f9226d4c090034d81735a61a4505da2068e207d5885452637bfcf87f434278e58db281bce79d49e0d941bf3ead9550541b459fad386a7dd60e24c4446

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 f603843c4b1146c576a2c9e0826de265
SHA1 5de71ba33c20cfb74c19c706a4a44706d78fb102
SHA256 ada9d1ffc0e78d2e2c05290b4ba1b1b04bc9c97a8f8e084ae0d49e36a9bb9c0c
SHA512 7a5a8ebc1c12193783ae711eb4716c1a2e52d1c4799dcd7f2a29924c246b1c665f456de3eaffd5e9cd7f42e788009e2798d1121c8d695698c86349bff17d5e8a

C:\Users\Admin\AppData\Local\Temp\nskB9CB.tmp

MD5 16d513397f3c1f8334e8f3e4fc49828f
SHA1 4ee15afca81ca6a13af4e38240099b730d6931f0
SHA256 d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA512 4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

C:\Users\Admin\AppData\Local\Temp\nslBB05.tmp\System.dll

MD5 0063d48afe5a0cdc02833145667b6641
SHA1 e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256 ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA512 71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

C:\Users\Admin\AppData\Local\Temp\nsaBB15.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsaBB15.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsaBB15.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsgBC20.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nswBD1B.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nswBD1B.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nswBD1B.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nswBD1B.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nswBD1B.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

memory/3404-587-0x0000000004D90000-0x0000000006424000-memory.dmp

memory/3404-588-0x00000000770B1000-0x00000000771D1000-memory.dmp

memory/3404-589-0x0000000073D04000-0x0000000073D05000-memory.dmp

memory/3404-591-0x0000000004D90000-0x0000000006424000-memory.dmp

memory/3820-599-0x0000000000800000-0x0000000001A54000-memory.dmp

memory/3820-600-0x0000000000800000-0x000000000080E000-memory.dmp

memory/3820-601-0x0000000035C30000-0x0000000035CCC000-memory.dmp

memory/3820-603-0x00000000361A0000-0x0000000036744000-memory.dmp

memory/3820-604-0x0000000035DD0000-0x0000000035E62000-memory.dmp

memory/3820-605-0x0000000035E70000-0x0000000035E7A000-memory.dmp

memory/3820-607-0x0000000036850000-0x00000000368B6000-memory.dmp