Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe
Resource
win7-20240708-en
General
-
Target
e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe
-
Size
94KB
-
MD5
15f590d01e895b97bc3717009af7c3a5
-
SHA1
14208862a69608a228becbfd2b97f4b1dc4a8e59
-
SHA256
e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4
-
SHA512
d1786b5771b182f06fa1ed17f79f40e8f7497457305d63c029b2321ee0108836b60470ca535f85e0c5a5c5dc059c288adbc3f20267ff38ec0210223aec6f6e70
-
SSDEEP
1536:nUhTw+85Q73zx+aEV9TWGjJPxbileYbvlD++kam:nsjeQ3x+zIYJJbsbvlDF4
Malware Config
Extracted
xworm
3.1
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a00000001225f-3.dat family_xworm behavioral1/memory/2024-8-0x0000000000C20000-0x0000000000C34000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 2024 0.dll -
Loads dropped DLL 1 IoCs
pid Process 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 0.dll -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2024 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe 30 PID 2384 wrote to memory of 2024 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe 30 PID 2384 wrote to memory of 2024 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe 30 PID 2384 wrote to memory of 2024 2384 e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe"C:\Users\Admin\AppData\Local\Temp\e9fb65bb3d8aef622fe674d24bae8e4dcfc688f82d95c1eeb1be778e7bfb08b4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\0.dllC:\Users\Admin\AppData\Local\Temp\0.dll2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5b7fd5ed6cad1d30f3f85ccca261c8881
SHA1a53a7eb56898a4d7bddbb67e0e98395ec4e3a4cd
SHA256651c210acb91494cf0998e7d80c4208f990bec4749af2fb0a3898021db650935
SHA512983b8b50501ab58a79a927e41aaa5298e42e5564eafafb36fb701a735c818df5b79fd16b3345791abd399cfbc1185d80ebc663bf8e34b05f9a87240506cdcd89