Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ItachiSuperSpoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ItachiSuperSpoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
ItachiSuperSpoofer.exe
-
Size
46KB
-
MD5
bbcc30d76b31b102204c01d112f98b15
-
SHA1
a05e5f69ab886c58e695e5f545b34193fce169a7
-
SHA256
e3bd1735607a84ce63f2678c0e3b5397f665a2826c5603b53345072a91c5d815
-
SHA512
502237bc308be48adb6ddfef3edd7db045aaa6dd9712fd026a5e51fbe3011faaa50ca8fb8f11f4a4ad67e4398da84acd5281768e9856d6cede8a420d1e2327b9
-
SSDEEP
768:tc4O3Um5dr30Cn2W/AD1JeM7XzYc/cEzwsf9K0g6tJhZW9s:t6km5dX2WYDrvxz5XgCRb
Malware Config
Extracted
xworm
5.0
ensure-manual.gl.at.ply.gg:41199
v67WFYQWDnW3aeSs
-
Install_directory
%AppData%
-
install_file
dllhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023b33-5.dat family_xworm behavioral2/memory/3060-18-0x00000000005A0000-0x00000000005AE000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ItachiSuperSpoofer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.lnk dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.lnk dllhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe" dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 12 IoCs
pid Process 4288 timeout.exe 3940 timeout.exe 4676 timeout.exe 3264 timeout.exe 3500 timeout.exe 548 timeout.exe 1684 timeout.exe 2464 timeout.exe 2240 timeout.exe 4708 timeout.exe 4276 timeout.exe 3328 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 dllhost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3060 2552 ItachiSuperSpoofer.exe 84 PID 2552 wrote to memory of 3060 2552 ItachiSuperSpoofer.exe 84 PID 2552 wrote to memory of 3676 2552 ItachiSuperSpoofer.exe 85 PID 2552 wrote to memory of 3676 2552 ItachiSuperSpoofer.exe 85 PID 3676 wrote to memory of 548 3676 cmd.exe 87 PID 3676 wrote to memory of 548 3676 cmd.exe 87 PID 3676 wrote to memory of 1684 3676 cmd.exe 93 PID 3676 wrote to memory of 1684 3676 cmd.exe 93 PID 3676 wrote to memory of 4288 3676 cmd.exe 97 PID 3676 wrote to memory of 4288 3676 cmd.exe 97 PID 3676 wrote to memory of 4276 3676 cmd.exe 98 PID 3676 wrote to memory of 4276 3676 cmd.exe 98 PID 3676 wrote to memory of 3940 3676 cmd.exe 99 PID 3676 wrote to memory of 3940 3676 cmd.exe 99 PID 3676 wrote to memory of 4676 3676 cmd.exe 103 PID 3676 wrote to memory of 4676 3676 cmd.exe 103 PID 3676 wrote to memory of 3328 3676 cmd.exe 104 PID 3676 wrote to memory of 3328 3676 cmd.exe 104 PID 3676 wrote to memory of 2464 3676 cmd.exe 106 PID 3676 wrote to memory of 2464 3676 cmd.exe 106 PID 3676 wrote to memory of 3264 3676 cmd.exe 110 PID 3676 wrote to memory of 3264 3676 cmd.exe 110 PID 3676 wrote to memory of 2240 3676 cmd.exe 112 PID 3676 wrote to memory of 2240 3676 cmd.exe 112 PID 3676 wrote to memory of 4708 3676 cmd.exe 113 PID 3676 wrote to memory of 4708 3676 cmd.exe 113 PID 3676 wrote to memory of 3500 3676 cmd.exe 114 PID 3676 wrote to memory of 3500 3676 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\ItachiSuperSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\ItachiSuperSpoofer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\spoofer.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:548
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1684
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4288
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4276
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3940
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4676
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3328
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2464
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3264
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2240
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4708
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD587a8223a150351f1b411f8e0e0331bbe
SHA1abf6850f06287b52e4520b7934d2e75f63078073
SHA256aac24eb0a68cb3c89fd981c43893cee5223af8070bef57bf0d5f51440986b34c
SHA512f82e6120338e826b1f3365c36de207f0bee2fcdbc8022b713ab76b2a86e93ebf987578d02b9079e8fc032e6601baf618eece1091088fddc3acd85f35e56931b7
-
Filesize
1KB
MD5e9b0e93ae7c7ffeb49a9704a4c1d6bc9
SHA155a855e9350ba9d9a5cb4716791b75ff3d6d92b5
SHA256ade1d00da9e13c81e5246b27e5d26e408e28711029198723390dafd223531267
SHA512a2a57fac6762ec36482c1c8aa19c38308b61ccdbab209e17d0bb4b1dc22406f9cce0bc180f7b22f38b4b8841d56bd86c933efbdbfab20ded18dfb2439a14df0b