Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
ORDER REF_47806798 .exe
Resource
win7-20240903-en
General
-
Target
ORDER REF_47806798 .exe
-
Size
1.1MB
-
MD5
b1409192281b85ae112868f828087864
-
SHA1
a6e85b73dfbc0494f435fe2e78bdb4977a4a2fe5
-
SHA256
3721299ab8cab7453d4781c5d3acc4304dffd8335164fbdfc31c80959cb0b35b
-
SHA512
509ad61d75da81b46ce50ab32f787b6bbf0763a5dfe9e7c2ce0791b7a5006af8529c3b54fb3ec76a3709dbf8b9562b1150fae50a59bf9eb2f56529b98ea56ebf
-
SSDEEP
12288:1CaR45KgL9fLyT+o2+gmuQIIq65/PKtfCnbMtqL:c2gBfLxHBQIf6pihCIc
Malware Config
Extracted
xworm
3.1
176.9.162.125:4060
4ZrqftQk1xSTve1a
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/276-9-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/276-15-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/276-13-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/276-11-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/276-8-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1028 powershell.exe 3024 powershell.exe 2612 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\regsvcs.lnk regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\regsvcs.lnk regsvcs.exe -
Loads dropped DLL 1 IoCs
pid Process 276 regsvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 276 2392 ORDER REF_47806798 .exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1028 powershell.exe 3024 powershell.exe 2612 powershell.exe 276 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2392 ORDER REF_47806798 .exe Token: SeDebugPrivilege 276 regsvcs.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 276 regsvcs.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 276 2392 ORDER REF_47806798 .exe 31 PID 2392 wrote to memory of 2236 2392 ORDER REF_47806798 .exe 32 PID 2392 wrote to memory of 2236 2392 ORDER REF_47806798 .exe 32 PID 2392 wrote to memory of 2236 2392 ORDER REF_47806798 .exe 32 PID 276 wrote to memory of 1028 276 regsvcs.exe 34 PID 276 wrote to memory of 1028 276 regsvcs.exe 34 PID 276 wrote to memory of 1028 276 regsvcs.exe 34 PID 276 wrote to memory of 1028 276 regsvcs.exe 34 PID 276 wrote to memory of 3024 276 regsvcs.exe 36 PID 276 wrote to memory of 3024 276 regsvcs.exe 36 PID 276 wrote to memory of 3024 276 regsvcs.exe 36 PID 276 wrote to memory of 3024 276 regsvcs.exe 36 PID 276 wrote to memory of 2612 276 regsvcs.exe 38 PID 276 wrote to memory of 2612 276 regsvcs.exe 38 PID 276 wrote to memory of 2612 276 regsvcs.exe 38 PID 276 wrote to memory of 2612 276 regsvcs.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER REF_47806798 .exe"C:\Users\Admin\AppData\Local\Temp\ORDER REF_47806798 .exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'regsvcs.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\regsvcs.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2392 -s 6162⤵PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cdbc39ad4cc4e0323a04d84d26824641
SHA146afcb05e677f0aeb937903b8d489cae25574eb6
SHA25662422555fda20227d3812159ecab93455eb6baaff601ed40048fe42c4aa397a2
SHA512888707c7dcc374e935b4eb97384f11431ce29b81a76f23c0283e602f763cc72d59cfdfddec2ae268aa11af80c491288db94eb77bef66413f7df747afb958967e
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215