Analysis
-
max time kernel
98s -
max time network
158s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-11-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
ItachiSuperSpoofer.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
ItachiSuperSpoofer.exe
-
Size
46KB
-
MD5
bbcc30d76b31b102204c01d112f98b15
-
SHA1
a05e5f69ab886c58e695e5f545b34193fce169a7
-
SHA256
e3bd1735607a84ce63f2678c0e3b5397f665a2826c5603b53345072a91c5d815
-
SHA512
502237bc308be48adb6ddfef3edd7db045aaa6dd9712fd026a5e51fbe3011faaa50ca8fb8f11f4a4ad67e4398da84acd5281768e9856d6cede8a420d1e2327b9
-
SSDEEP
768:tc4O3Um5dr30Cn2W/AD1JeM7XzYc/cEzwsf9K0g6tJhZW9s:t6km5dX2WYDrvxz5XgCRb
Malware Config
Extracted
xworm
5.0
ensure-manual.gl.at.ply.gg:41199
v67WFYQWDnW3aeSs
-
Install_directory
%AppData%
-
install_file
dllhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x002300000004500f-6.dat family_xworm behavioral1/memory/2476-23-0x0000000000370000-0x000000000037E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation ItachiSuperSpoofer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.lnk dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.lnk dllhost.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe" dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 12 IoCs
pid Process 1708 timeout.exe 1836 timeout.exe 1816 timeout.exe 3788 timeout.exe 4092 timeout.exe 2260 timeout.exe 2336 timeout.exe 1264 timeout.exe 3376 timeout.exe 2900 timeout.exe 3596 timeout.exe 1612 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 dllhost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1156 wrote to memory of 2476 1156 ItachiSuperSpoofer.exe 81 PID 1156 wrote to memory of 2476 1156 ItachiSuperSpoofer.exe 81 PID 1156 wrote to memory of 4692 1156 ItachiSuperSpoofer.exe 82 PID 1156 wrote to memory of 4692 1156 ItachiSuperSpoofer.exe 82 PID 4692 wrote to memory of 3788 4692 cmd.exe 84 PID 4692 wrote to memory of 3788 4692 cmd.exe 84 PID 4692 wrote to memory of 4092 4692 cmd.exe 86 PID 4692 wrote to memory of 4092 4692 cmd.exe 86 PID 4692 wrote to memory of 3376 4692 cmd.exe 87 PID 4692 wrote to memory of 3376 4692 cmd.exe 87 PID 4692 wrote to memory of 2260 4692 cmd.exe 90 PID 4692 wrote to memory of 2260 4692 cmd.exe 90 PID 4692 wrote to memory of 2336 4692 cmd.exe 93 PID 4692 wrote to memory of 2336 4692 cmd.exe 93 PID 4692 wrote to memory of 2900 4692 cmd.exe 95 PID 4692 wrote to memory of 2900 4692 cmd.exe 95 PID 4692 wrote to memory of 1708 4692 cmd.exe 96 PID 4692 wrote to memory of 1708 4692 cmd.exe 96 PID 4692 wrote to memory of 3596 4692 cmd.exe 98 PID 4692 wrote to memory of 3596 4692 cmd.exe 98 PID 4692 wrote to memory of 1836 4692 cmd.exe 99 PID 4692 wrote to memory of 1836 4692 cmd.exe 99 PID 4692 wrote to memory of 1816 4692 cmd.exe 100 PID 4692 wrote to memory of 1816 4692 cmd.exe 100 PID 4692 wrote to memory of 1612 4692 cmd.exe 102 PID 4692 wrote to memory of 1612 4692 cmd.exe 102 PID 4692 wrote to memory of 1264 4692 cmd.exe 103 PID 4692 wrote to memory of 1264 4692 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ItachiSuperSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\ItachiSuperSpoofer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\spoofer.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3788
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4092
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3376
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2260
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2336
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2900
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1708
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3596
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1836
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1816
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1612
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD587a8223a150351f1b411f8e0e0331bbe
SHA1abf6850f06287b52e4520b7934d2e75f63078073
SHA256aac24eb0a68cb3c89fd981c43893cee5223af8070bef57bf0d5f51440986b34c
SHA512f82e6120338e826b1f3365c36de207f0bee2fcdbc8022b713ab76b2a86e93ebf987578d02b9079e8fc032e6601baf618eece1091088fddc3acd85f35e56931b7
-
Filesize
1KB
MD5e9b0e93ae7c7ffeb49a9704a4c1d6bc9
SHA155a855e9350ba9d9a5cb4716791b75ff3d6d92b5
SHA256ade1d00da9e13c81e5246b27e5d26e408e28711029198723390dafd223531267
SHA512a2a57fac6762ec36482c1c8aa19c38308b61ccdbab209e17d0bb4b1dc22406f9cce0bc180f7b22f38b4b8841d56bd86c933efbdbfab20ded18dfb2439a14df0b