Analysis
-
max time kernel
117s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/11/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
New Order 20242405.exe
Resource
win7-20240903-en
General
-
Target
New Order 20242405.exe
-
Size
562KB
-
MD5
ff9e45d7326698f34526793bf1244811
-
SHA1
b3ff69abfe1c5e6633a866ffbebe2139a69e3f0a
-
SHA256
4db566fcdc413fe50153dc8431ae86192241f0e1e86071f80d42eb6e0fb5baca
-
SHA512
ed2e02262beb00f77c5d17854c7b6544cdb4edce37e870505e21c0cd08999cb99904a667e5ed31cde3a3437c4e9713e6bfc63f091b30a9cec25a046ad0120657
-
SSDEEP
12288:FDxrXQ9TZweejcQ1FXQEcupRk6CvPlZ0wJOszYkR:ZQejd1BpcupC6Cb0qL
Malware Config
Extracted
xworm
3.1
kanrplest.duckdns.org:4068
TdUxMCK2FUdy51AH
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/1408-28-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/1408-25-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/1408-23-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/1408-29-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/1408-32-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2664 powershell.exe 2524 powershell.exe 2004 powershell.exe 1492 powershell.exe 620 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\New Order 20242405.lnk New Order 20242405.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\New Order 20242405.lnk New Order 20242405.exe -
Loads dropped DLL 1 IoCs
pid Process 1408 New Order 20242405.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\New Order 20242405 = "C:\\Users\\Admin\\AppData\\Roaming\\New Order 20242405.exe" New Order 20242405.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 1408 2824 New Order 20242405.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order 20242405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order 20242405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2824 New Order 20242405.exe 2824 New Order 20242405.exe 2824 New Order 20242405.exe 2824 New Order 20242405.exe 2664 powershell.exe 2524 powershell.exe 2004 powershell.exe 1492 powershell.exe 620 powershell.exe 1408 New Order 20242405.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2824 New Order 20242405.exe Token: SeDebugPrivilege 1408 New Order 20242405.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 620 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1408 New Order 20242405.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2664 2824 New Order 20242405.exe 30 PID 2824 wrote to memory of 2664 2824 New Order 20242405.exe 30 PID 2824 wrote to memory of 2664 2824 New Order 20242405.exe 30 PID 2824 wrote to memory of 2664 2824 New Order 20242405.exe 30 PID 2824 wrote to memory of 2524 2824 New Order 20242405.exe 32 PID 2824 wrote to memory of 2524 2824 New Order 20242405.exe 32 PID 2824 wrote to memory of 2524 2824 New Order 20242405.exe 32 PID 2824 wrote to memory of 2524 2824 New Order 20242405.exe 32 PID 2824 wrote to memory of 2560 2824 New Order 20242405.exe 33 PID 2824 wrote to memory of 2560 2824 New Order 20242405.exe 33 PID 2824 wrote to memory of 2560 2824 New Order 20242405.exe 33 PID 2824 wrote to memory of 2560 2824 New Order 20242405.exe 33 PID 2824 wrote to memory of 2440 2824 New Order 20242405.exe 36 PID 2824 wrote to memory of 2440 2824 New Order 20242405.exe 36 PID 2824 wrote to memory of 2440 2824 New Order 20242405.exe 36 PID 2824 wrote to memory of 2440 2824 New Order 20242405.exe 36 PID 2824 wrote to memory of 992 2824 New Order 20242405.exe 37 PID 2824 wrote to memory of 992 2824 New Order 20242405.exe 37 PID 2824 wrote to memory of 992 2824 New Order 20242405.exe 37 PID 2824 wrote to memory of 992 2824 New Order 20242405.exe 37 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 2824 wrote to memory of 1408 2824 New Order 20242405.exe 38 PID 1408 wrote to memory of 2004 1408 New Order 20242405.exe 39 PID 1408 wrote to memory of 2004 1408 New Order 20242405.exe 39 PID 1408 wrote to memory of 2004 1408 New Order 20242405.exe 39 PID 1408 wrote to memory of 2004 1408 New Order 20242405.exe 39 PID 1408 wrote to memory of 1492 1408 New Order 20242405.exe 41 PID 1408 wrote to memory of 1492 1408 New Order 20242405.exe 41 PID 1408 wrote to memory of 1492 1408 New Order 20242405.exe 41 PID 1408 wrote to memory of 1492 1408 New Order 20242405.exe 41 PID 1408 wrote to memory of 620 1408 New Order 20242405.exe 43 PID 1408 wrote to memory of 620 1408 New Order 20242405.exe 43 PID 1408 wrote to memory of 620 1408 New Order 20242405.exe 43 PID 1408 wrote to memory of 620 1408 New Order 20242405.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RTUZKYTc.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RTUZKYTc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA785.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"2⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"2⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\New Order 20242405.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'New Order 20242405.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\New Order 20242405.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567a03c56b33f3e35dadb05097f834df3
SHA1717f6aec972d49e5d24ee0f2897a0c5105fe804f
SHA2566a089004fb50c4cdba024723ca59c8a8377cad289066148fe89efbf162908de8
SHA512c568930e375297c8c017229e84fd48db43d7f082f616bee157d75e32e8ae32447bc112c129c479d5e36b4d4af338b2a7c8b71a18760c20b4354513c8b7b521af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5de31c6163b50fccc5ba255e913151275
SHA1a618199688b64ddad511222f2e8145f3997a2205
SHA2564cdcfbea4196e2f566dfa2846caa18f4b1195adbf37ecda0b57ce31888e255d7
SHA512641da8d0c15ae4caa69afa86487bc0a25d63403b8d3e7969d10ea77e58aad58d129e13a1ee5ac3bd9b07bbf3e3ca93f14d7f8c7a56087b904aaba2814b06535b
-
Filesize
562KB
MD5ff9e45d7326698f34526793bf1244811
SHA1b3ff69abfe1c5e6633a866ffbebe2139a69e3f0a
SHA2564db566fcdc413fe50153dc8431ae86192241f0e1e86071f80d42eb6e0fb5baca
SHA512ed2e02262beb00f77c5d17854c7b6544cdb4edce37e870505e21c0cd08999cb99904a667e5ed31cde3a3437c4e9713e6bfc63f091b30a9cec25a046ad0120657