Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe
Resource
win7-20240903-en
General
-
Target
0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe
-
Size
100KB
-
MD5
e56c93a71f5733ebc322a33658d19822
-
SHA1
dbfc91851cffa4dcc8ef2bd394f14e7e9d3da139
-
SHA256
0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633
-
SHA512
edc74826f32c148484509af0e4b8f55d66e16b10cb52d0ec2c43342d215ecee873fba7a56a8f2b43d133d2057e273d70b60d44e1fcf5376733a666bc701a859f
-
SSDEEP
1536:bEOwgFowSgnVVVHzExnAdgVxDSMnEiqIYdfi/GExtulSpn:4rwanDVxjqdIntulS
Malware Config
Extracted
xworm
3.1
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000012102-3.dat family_xworm behavioral1/memory/1148-8-0x00000000002E0000-0x00000000002F4000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 1148 0.dll -
Loads dropped DLL 1 IoCs
pid Process 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 0.dll -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1148 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe 30 PID 2580 wrote to memory of 1148 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe 30 PID 2580 wrote to memory of 1148 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe 30 PID 2580 wrote to memory of 1148 2580 0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe"C:\Users\Admin\AppData\Local\Temp\0f659dec7213d244ebd6fb42cf85981b6a55e91b7f4d1db1dbfa9e21c9d7e633.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\0.dllC:\Users\Admin\AppData\Local\Temp\0.dll2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5b7fd5ed6cad1d30f3f85ccca261c8881
SHA1a53a7eb56898a4d7bddbb67e0e98395ec4e3a4cd
SHA256651c210acb91494cf0998e7d80c4208f990bec4749af2fb0a3898021db650935
SHA512983b8b50501ab58a79a927e41aaa5298e42e5564eafafb36fb701a735c818df5b79fd16b3345791abd399cfbc1185d80ebc663bf8e34b05f9a87240506cdcd89