Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 08:41
Behavioral task
behavioral1
Sample
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe
Resource
win10v2004-20241007-en
General
-
Target
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe
-
Size
41KB
-
MD5
5c48fe3471cf8db3c8c1cc1278566ec7
-
SHA1
ec5b1513df34018699823939858846dceed347a7
-
SHA256
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3
-
SHA512
ac91cd0780099d02ee3d57962439812d5a5c147177caabbddedf2da274720c953543de7b8ce33d83cde8a5b9043736c75eac17779940292e5fa3024ca048320d
-
SSDEEP
768:tCJu44/aeqvujYXJMs5afEHDmaFWPa926OwhZZameu:tgu44/imwKsEfapFv926OwRzeu
Malware Config
Extracted
xworm
5.0
copy-nigeria.gl.at.ply.gg:21026
hHrxBd1WbcJItcMM
-
Install_directory
%ProgramData%
-
install_file
Desktop Windows Manager.exe
-
telegram
https://api.telegram.org/bot7269786725:AAF0IPx1BWTdW_vbZqP8HGNrxWWFpF5CvYs/sendMessage?chat_id=5465523859
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2264-1-0x0000000000F60000-0x0000000000F70000-memory.dmp family_xworm -
Xworm family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1056 cmd.exe -
Drops startup file 2 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop Windows Manager.lnk 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop Windows Manager.lnk 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Desktop Windows Manager = "C:\\ProgramData\\Desktop Windows Manager.exe" 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1344 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exepid process 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exedescription pid process Token: SeDebugPrivilege 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe Token: SeDebugPrivilege 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exepid process 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.execmd.exedescription pid process target process PID 2264 wrote to memory of 2756 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 2756 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 2756 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 2892 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 2892 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 2892 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe schtasks.exe PID 2264 wrote to memory of 1056 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe cmd.exe PID 2264 wrote to memory of 1056 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe cmd.exe PID 2264 wrote to memory of 1056 2264 490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe cmd.exe PID 1056 wrote to memory of 1344 1056 cmd.exe timeout.exe PID 1056 wrote to memory of 1344 1056 cmd.exe timeout.exe PID 1056 wrote to memory of 1344 1056 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe"C:\Users\Admin\AppData\Local\Temp\490865c96b82805a395497c5d870743b4fb9b2b9f3de548193a9dceaa11395a3.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Desktop Windows Manager" /tr "C:\ProgramData\Desktop Windows Manager.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "Desktop Windows Manager"2⤵PID:2892
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5EB3.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1344
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {43A1B1E1-A071-4558-BE42-F07BCEEFB6F7} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD55880558d6cc12d4e8f22ff13feeadcb2
SHA17d69d4f89643a46db100f1070bf2c57471f5c6c4
SHA2565e859bfb23243513d2ca9e790b29d5cfb81c037dc1451173f438f6f3f0dc9304
SHA512a1ba757f0572a8ab35d4cdd46fd8adbffca3d9f86ace7ef751af6302226032e3dfb595df866f1e67b132a610ef6feafd6a664274b62bb26689dc02e36e157641