Analysis
-
max time kernel
8s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-11-2024 17:49
Static task
static1
1 signatures
General
-
Target
TaskHost.exe
-
Size
107KB
-
MD5
4d06963d7c33e9b7e2885ff12ea60e9d
-
SHA1
c6fcdc1f700a7acdf67116894cf615a57d8bcb3e
-
SHA256
f1019aa9fc34248f9a0fbb425d49b76fef4def91f83a72f7ccadb89a4b542c26
-
SHA512
c4ecc1e99b85548cb6c16a11aa0d0b4043fb1705a35990f658cab852537ee7240cbb33aa3c9d849477b14294188dd2e7a634f96f8a40a0358e96a2d5d0502c30
-
SSDEEP
1536:vVvKDxm/PBlYBe2qJU0F4AvGIXj4wNGtTkgP4kQx3T7sglLg2q85c/avK7R9q:d2x+Bl/8AvNFNGtTkgw/x3f7cjsiFk
Malware Config
Extracted
Family
xworm
C2
93.123.109.89:7000
Attributes
-
Install_directory
%Temp%
-
install_file
BackgroundTaskHost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4668-5-0x0000000000910000-0x0000000000926000-memory.dmp family_xworm -
Xworm family
-
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4140 set thread context of 4668 4140 TaskHost.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 1040 4668 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaskHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4668 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80 PID 4140 wrote to memory of 4668 4140 TaskHost.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\TaskHost.exe"C:\Users\Admin\AppData\Local\Temp\TaskHost.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 16923⤵
- Program crash
PID:1040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4668 -ip 46681⤵PID:3164