Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 17:45
Behavioral task
behavioral1
Sample
dist/sdfysdfa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dist/sdfysdfa.exe
Resource
win10v2004-20241007-en
General
-
Target
dist/sdfysdfa.exe
-
Size
7.6MB
-
MD5
072e4116922c55a0acb83c6d7dbbb8e6
-
SHA1
22c700bbddfecd3e0a157fc2182f1f62cb64f96b
-
SHA256
f6199b227874bd24a02cfdead551441aebb9b6284aace5ffa9665db7b7651c92
-
SHA512
8d6dce2a006dc4435443f5ca8b91257246b123fce3cbae9d2b3fa3cec8306aafa8314f2918569c2694c8429706a2e56133eeb1c773882b6f3eb0b3300356c3d6
-
SSDEEP
196608:TQJY0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:qY0aVBDfDspfaMPgS1A
Malware Config
Extracted
xworm
5.0
109.206.246.102:3387
MlpCbb9Z3AhhmnSA
-
Install_directory
%AppData%
-
install_file
骇客开发.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cf0-73.dat family_xworm behavioral2/memory/1832-76-0x0000000000830000-0x0000000000860000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4528 powershell.exe 3832 powershell.exe 4456 powershell.exe 3412 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation tmpjzc2nubk -
Executes dropped EXE 3 IoCs
pid Process 1832 tmpjzc2nubk 448 骇客开发.exe 3004 骇客开发.exe -
Loads dropped DLL 7 IoCs
pid Process 4288 sdfysdfa.exe 4288 sdfysdfa.exe 4288 sdfysdfa.exe 4288 sdfysdfa.exe 4288 sdfysdfa.exe 4288 sdfysdfa.exe 4288 sdfysdfa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\骇客开发 = "C:\\Users\\Admin\\AppData\\Roaming\\骇客开发.exe" tmpjzc2nubk -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3916 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1832 tmpjzc2nubk -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4456 powershell.exe 4456 powershell.exe 3412 powershell.exe 3412 powershell.exe 4528 powershell.exe 4528 powershell.exe 3832 powershell.exe 3832 powershell.exe 1832 tmpjzc2nubk -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1832 tmpjzc2nubk Token: SeDebugPrivilege 4456 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeDebugPrivilege 448 骇客开发.exe Token: SeDebugPrivilege 3004 骇客开发.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1832 tmpjzc2nubk -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4288 3908 sdfysdfa.exe 85 PID 3908 wrote to memory of 4288 3908 sdfysdfa.exe 85 PID 4288 wrote to memory of 1832 4288 sdfysdfa.exe 86 PID 4288 wrote to memory of 1832 4288 sdfysdfa.exe 86 PID 1832 wrote to memory of 4456 1832 tmpjzc2nubk 91 PID 1832 wrote to memory of 4456 1832 tmpjzc2nubk 91 PID 1832 wrote to memory of 3412 1832 tmpjzc2nubk 93 PID 1832 wrote to memory of 3412 1832 tmpjzc2nubk 93 PID 1832 wrote to memory of 4528 1832 tmpjzc2nubk 95 PID 1832 wrote to memory of 4528 1832 tmpjzc2nubk 95 PID 1832 wrote to memory of 3832 1832 tmpjzc2nubk 97 PID 1832 wrote to memory of 3832 1832 tmpjzc2nubk 97 PID 1832 wrote to memory of 3916 1832 tmpjzc2nubk 101 PID 1832 wrote to memory of 3916 1832 tmpjzc2nubk 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dist\sdfysdfa.exe"C:\Users\Admin\AppData\Local\Temp\dist\sdfysdfa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\dist\sdfysdfa.exe"C:\Users\Admin\AppData\Local\Temp\dist\sdfysdfa.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\tmpjzc2nubkC:\Users\Admin\AppData\Local\Temp\tmpjzc2nubk3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\tmpjzc2nubk'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'tmpjzc2nubk'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\骇客开发.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '骇客开发.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "骇客开发" /tr "C:\Users\Admin\AppData\Roaming\骇客开发.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3916
-
-
-
-
C:\Users\Admin\AppData\Roaming\骇客开发.exeC:\Users\Admin\AppData\Roaming\骇客开发.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:448
-
C:\Users\Admin\AppData\Roaming\骇客开发.exeC:\Users\Admin\AppData\Roaming\骇客开发.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD59d20bed748fbb656980b0328d7b74728
SHA15fc8910c493356c0968a86452cb7952917b954b4
SHA256172fe07653a93456e66d5b90333de53e23a561cf982a1a9d96c3459339009069
SHA512eb1f0ca1042371a0d324ba520a9c4159fe91d34cf1851d829b1bf874b92f69fd08c540558d03f9a8c3286926c3c12d89ef9a70ac649c053a02f26922918054f1
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
82KB
MD5a62207fc33140de460444e191ae19b74
SHA19327d3d4f9d56f1846781bcb0a05719dea462d74
SHA256ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2
SHA51290f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7
-
Filesize
120KB
MD59b344f8d7ce5b57e397a475847cc5f66
SHA1aff1ccc2608da022ecc8d0aba65d304fe74cdf71
SHA256b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf
SHA5122b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41
-
Filesize
155KB
MD50c7ea68ca88c07ae6b0a725497067891
SHA1c2b61a3e230b30416bc283d1f3ea25678670eb74
SHA256f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11
SHA512fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9
-
Filesize
1.7MB
MD5c02b1b28775aa757d008b2b0e52a4943
SHA1f5c12fa0eddb3a4127bd0866714bdcf10a7abead
SHA256eb71c75ad9fa6aba6e8b793948a96029a190b612bb289c780621757d90c08577
SHA51258ae35c802ef81da05e9aeef0f16e9b27d6391e9dffb8aa77ea8406497201766d9fd7834d40a167485f452f57b51066988afc344c733129d1e4fad78b8dcf1c5
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
5.5MB
MD5e2bd5ae53427f193b42d64b8e9bf1943
SHA17c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
171KB
MD53de65358ac4bfd660b3a0732fa792efd
SHA1db110bc382cff7b01cfcad339d2872957515353b
SHA256c1962fb2b39497d87d631556d48b898393681658a9c40b65164de283c79cf524
SHA51224ca234b09ad247116ab2142a9f6de4317e24103e21f530c7c5f9dd5c78591c1c3ac87461ce39d9354d0990e6ab9d20fb2ab14cfa2bb7a6b91beaf5bbc1a67f0