Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
FrameHost.exe
Resource
win7-20240903-en
General
-
Target
FrameHost.exe
-
Size
120KB
-
MD5
2e7bdd19ac4b1b5392d1d3ae047c9379
-
SHA1
67b4265da671de12bd3830f3e45f02e020ce85f4
-
SHA256
a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f
-
SHA512
d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646
-
SSDEEP
3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv
Malware Config
Extracted
xworm
93.123.109.89:7000
-
Install_directory
%Temp%
-
install_file
ApplicationFrameHost.exe
-
telegram
https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1864-2-0x0000000000400000-0x0000000000418000-memory.dmp family_xworm -
Xworm family
-
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1212 set thread context of 1864 1212 FrameHost.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3516 1864 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FrameHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84 PID 1212 wrote to memory of 1864 1212 FrameHost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\FrameHost.exe"C:\Users\Admin\AppData\Local\Temp\FrameHost.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 17043⤵
- Program crash
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1864 -ip 18641⤵PID:3620