Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03-11-2024 00:20

General

  • Target

    Dragon.exe

  • Size

    275KB

  • MD5

    4a2b87da39aa0c18015c52982d9b041e

  • SHA1

    418bb0b60e5613abfd28348bdee58a009122e66e

  • SHA256

    7c78edd54d043b9ac2d4556c10f7bd07f4dd2258fd46a0f6469200431f8a21a0

  • SHA512

    921797a79bb863432aa9b635e4f144678836eff9ec3a0cf31d6aad5805018b5abe8f6dd2fa830f72a3fdcd77c0ce112becf0d13cefb0119c5c96f63d2be3744d

  • SSDEEP

    3072:LIvTbyuUBoAlsYJ7OcrFZrvjKP60cq/ehN8zuUQr2jRIpzgD7ZKDwodfKdM9:iylsYJ7Ocr/j1UQr2jf3ZKswU

Score
10/10

Malware Config

Extracted

Family

xworm

C2

ensure-manual.gl.at.ply.gg:41199

Attributes
  • Install_directory

    %AppData%

  • install_file

    dllhost.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dragon.exe
    "C:\Users\Admin\AppData\Local\Temp\Dragon.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Roaming\Dragon.exe
      "C:\Users\Admin\AppData\Roaming\Dragon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3028
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\dragon.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1680
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1080
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1868
      • C:\Windows\System32\Bubbles.scr
        "C:\Windows\System32\Bubbles.scr" /S
        1⤵
          PID:3412

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Dragon.exe

          Filesize

          65KB

          MD5

          53a22b4902f3b98f3520a5ded2c98e04

          SHA1

          487c5b7f0d2fa11a68155406d67129c37e7c2a70

          SHA256

          64e409b3bc596cec8e7fda89a2bbf7b74fcc257544a8f999b7753bbebe47245a

          SHA512

          f2cef4ae06ffc9e62d81a6c46a6a58c6c155f544b0e58771d84b7dac08f6e2d6546722d1bbfefbd9a3e5a70e10c45f984c39c3c42dbcdf77db49ff35cf4a8f99

        • C:\Users\Admin\AppData\Roaming\dragon.bat

          Filesize

          2KB

          MD5

          b942ff88a54c0d0777addfb9b1d93f3e

          SHA1

          e8c800e0bca11c9c55f18e48be769a550be7840b

          SHA256

          45db70e76ba8e7d6e12ac548be6575757d43c56d78dbd0e3497f2b5c20c21979

          SHA512

          c707fa393917e21df77fc5147f39ac0d1a2d12479cc2752f4e3022308f4b079329271b2cbe6c0a00e15fa46561730a8c34bf472630b26d7ca1cd7e834b416aa2

        • memory/736-0-0x00007FFEBC7F3000-0x00007FFEBC7F5000-memory.dmp

          Filesize

          8KB

        • memory/736-1-0x0000000000660000-0x00000000006AA000-memory.dmp

          Filesize

          296KB

        • memory/1080-35-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-36-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-39-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-37-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-38-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-31-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-30-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-29-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-40-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/1080-41-0x000002B525340000-0x000002B525341000-memory.dmp

          Filesize

          4KB

        • memory/3028-23-0x0000000000320000-0x0000000000336000-memory.dmp

          Filesize

          88KB

        • memory/3028-28-0x00007FFEBC7F0000-0x00007FFEBD2B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3028-27-0x000000001B6B0000-0x000000001B7AF000-memory.dmp

          Filesize

          1020KB

        • memory/3028-26-0x00007FFEBC7F0000-0x00007FFEBD2B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3028-24-0x00007FFEBC7F0000-0x00007FFEBD2B2000-memory.dmp

          Filesize

          10.8MB