Analysis
-
max time kernel
5s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 20:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FrameHost.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
FrameHost.exe
-
Size
120KB
-
MD5
2e7bdd19ac4b1b5392d1d3ae047c9379
-
SHA1
67b4265da671de12bd3830f3e45f02e020ce85f4
-
SHA256
a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f
-
SHA512
d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646
-
SSDEEP
3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv
Malware Config
Extracted
Family
xworm
C2
93.123.109.89:7000
Attributes
-
Install_directory
%Temp%
-
install_file
ApplicationFrameHost.exe
-
telegram
https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/memory/2056-12-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm behavioral1/memory/2056-19-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm behavioral1/memory/2056-16-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm behavioral1/memory/2056-11-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm behavioral1/memory/2056-7-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm behavioral1/memory/2056-5-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm -
Xworm family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2056 2548 FrameHost.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FrameHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30 PID 2548 wrote to memory of 2056 2548 FrameHost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\FrameHost.exe"C:\Users\Admin\AppData\Local\Temp\FrameHost.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056
-