Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 17:45

General

  • Target

    99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe

  • Size

    7.9MB

  • MD5

    626b15a696ab0909a6a2f73bc50d1f9b

  • SHA1

    0e7f8f49236828da8586d5d779e46e454509e80f

  • SHA256

    99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861

  • SHA512

    56c6feb457e1894a6dd4b79cb19acc62036203be58c588bf09e88c359a5346b909a538112053ca42f2301b04a9bcc1ea02e3d77b7ebc484b80523879a0b2fd03

  • SSDEEP

    196608:mLO9Y0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:39Y0aVBDfDspfaMPgS1A

Malware Config

Extracted

Family

xworm

Version

5.0

C2

109.206.246.102:3387

Mutex

MlpCbb9Z3AhhmnSA

Attributes
  • Install_directory

    %AppData%

  • install_file

    骇客开发.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe
    "C:\Users\Admin\AppData\Local\Temp\99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe
      "C:\Users\Admin\AppData\Local\Temp\99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\tmpbja3rg80
        C:\Users\Admin\AppData\Local\Temp\tmpbja3rg80
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\tmpbja3rg80'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1768
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'tmpbja3rg80'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\骇客开发.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5096
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '骇客开发.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2024
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "骇客开发" /tr "C:\Users\Admin\AppData\Roaming\骇客开发.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:436
  • C:\Users\Admin\AppData\Roaming\骇客开发.exe
    C:\Users\Admin\AppData\Roaming\骇客开发.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:972
  • C:\Users\Admin\AppData\Roaming\骇客开发.exe
    C:\Users\Admin\AppData\Roaming\骇客开发.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1384
  • C:\Users\Admin\AppData\Roaming\骇客开发.exe
    C:\Users\Admin\AppData\Roaming\骇客开发.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    440cb38dbee06645cc8b74d51f6e5f71

    SHA1

    d7e61da91dc4502e9ae83281b88c1e48584edb7c

    SHA256

    8ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe

    SHA512

    3aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\骇客开发.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    be9965796e35a7999ce50af07f73b631

    SHA1

    dde100f3f5a51fa399755fefd49da003d887742a

    SHA256

    6ea6a56f5d5ec6f60b5a748840eed28859f792db2e37f4c1c419e3a92fc619b3

    SHA512

    45369246c8f6e80fa7a3c34db98922702e5f10e67348c94bb27f5bb241ad72cecd72ff5843a2c6b47cec390a6b9c97ba3c4d4244c62b8119ce1b2ca0c3dc3e37

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    9a2c763c5ff40e18e49ad63c7c3b0088

    SHA1

    4b289ea34755323fa869da6ad6480d8d12385a36

    SHA256

    517807921c55bd16cd8a8bfae3d5dc19444c66f836b66acd5593e3080acbaf8e

    SHA512

    3af01926bc7de92076067d158d7250b206d396b3282ee0db43639d04d91bd9ff763acbce12c7822914824984a3c5fdd1b8dbf1ad2ee88233d47f0f808b746bc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    1ede1175b176df450cee08ceea53267b

    SHA1

    42b837e37cf9c6315c4de761538576813b7101eb

    SHA256

    3221e8f1947d3d81d032837aee189d97ba5fb4365029eeb2eb16e831293372d6

    SHA512

    562239cc3215e4a7f0eb37faae6829472270c33423f6a0252794f404a86a6faf06c429c480e419d2f26167671613ccc06f3f622e8d7b6b7254fddcaa51b5cdec

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\VCRUNTIME140.dll

    Filesize

    106KB

    MD5

    4585a96cc4eef6aafd5e27ea09147dc6

    SHA1

    489cfff1b19abbec98fda26ac8958005e88dd0cb

    SHA256

    a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

    SHA512

    d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\_bz2.pyd

    Filesize

    82KB

    MD5

    a62207fc33140de460444e191ae19b74

    SHA1

    9327d3d4f9d56f1846781bcb0a05719dea462d74

    SHA256

    ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

    SHA512

    90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\_ctypes.pyd

    Filesize

    120KB

    MD5

    9b344f8d7ce5b57e397a475847cc5f66

    SHA1

    aff1ccc2608da022ecc8d0aba65d304fe74cdf71

    SHA256

    b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

    SHA512

    2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\_lzma.pyd

    Filesize

    155KB

    MD5

    0c7ea68ca88c07ae6b0a725497067891

    SHA1

    c2b61a3e230b30416bc283d1f3ea25678670eb74

    SHA256

    f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

    SHA512

    fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\base_library.zip

    Filesize

    1.7MB

    MD5

    c02b1b28775aa757d008b2b0e52a4943

    SHA1

    f5c12fa0eddb3a4127bd0866714bdcf10a7abead

    SHA256

    eb71c75ad9fa6aba6e8b793948a96029a190b612bb289c780621757d90c08577

    SHA512

    58ae35c802ef81da05e9aeef0f16e9b27d6391e9dffb8aa77ea8406497201766d9fd7834d40a167485f452f57b51066988afc344c733129d1e4fad78b8dcf1c5

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\libffi-8.dll

    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\python311.dll

    Filesize

    5.5MB

    MD5

    e2bd5ae53427f193b42d64b8e9bf1943

    SHA1

    7c317aad8e2b24c08d3b8b3fba16dd537411727f

    SHA256

    c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

    SHA512

    ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\ucrtbase.dll

    Filesize

    1021KB

    MD5

    4e326feeb3ebf1e3eb21eeb224345727

    SHA1

    f156a272dbc6695cc170b6091ef8cd41db7ba040

    SHA256

    3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9

    SHA512

    be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5dt1trv.vbl.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpbja3rg80

    Filesize

    171KB

    MD5

    3de65358ac4bfd660b3a0732fa792efd

    SHA1

    db110bc382cff7b01cfcad339d2872957515353b

    SHA256

    c1962fb2b39497d87d631556d48b898393681658a9c40b65164de283c79cf524

    SHA512

    24ca234b09ad247116ab2142a9f6de4317e24103e21f530c7c5f9dd5c78591c1c3ac87461ce39d9354d0990e6ab9d20fb2ab14cfa2bb7a6b91beaf5bbc1a67f0

  • memory/1428-127-0x00007FFC52E53000-0x00007FFC52E55000-memory.dmp

    Filesize

    8KB

  • memory/1428-75-0x00007FFC52E53000-0x00007FFC52E55000-memory.dmp

    Filesize

    8KB

  • memory/1428-129-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1428-130-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1428-76-0x0000000000E30000-0x0000000000E60000-memory.dmp

    Filesize

    192KB

  • memory/1768-92-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1768-89-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1768-88-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1768-87-0x00007FFC52E50000-0x00007FFC53911000-memory.dmp

    Filesize

    10.8MB

  • memory/1768-86-0x000001372D500000-0x000001372D522000-memory.dmp

    Filesize

    136KB