Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 16:02
Behavioral task
behavioral1
Sample
2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe
Resource
win7-20240708-en
General
-
Target
2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe
-
Size
64KB
-
MD5
2e511711556c84a5748e2a3c9508f79d
-
SHA1
793fd65b8ad3e3ff4d32b2a2a77873cdd2e51d14
-
SHA256
38933a739032b6ccbe0e7e21c2a3f68b26c87ec8f89e51701899099443affaf8
-
SHA512
ac49bf92e5ca38a776b2435eb502a8c04334f76a9d76f68e1c78b6d4edee9506959f840808884a71c17e45822e41b167c40de0a1b33caa8a4bed2775cdf274c7
-
SSDEEP
768:8TaTaHaxVq3LgGHk8qZHkvhxST9BeY0FWPG9tM6TOMh+7It:8TaT4a8gykRhWhx69BehFh9tM6TOMIk
Malware Config
Extracted
xworm
5.0
6lFXjUqCtT3P20q9
-
install_file
wintousb.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2316-1-0x0000000001350000-0x0000000001360000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1944 powershell.exe 2052 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 44 IoCs
flow ioc 14 raw.githubusercontent.com 26 raw.githubusercontent.com 28 raw.githubusercontent.com 35 raw.githubusercontent.com 49 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com 47 raw.githubusercontent.com 46 raw.githubusercontent.com 5 raw.githubusercontent.com 8 raw.githubusercontent.com 27 raw.githubusercontent.com 31 raw.githubusercontent.com 33 raw.githubusercontent.com 40 raw.githubusercontent.com 39 raw.githubusercontent.com 45 raw.githubusercontent.com 4 raw.githubusercontent.com 10 raw.githubusercontent.com 13 raw.githubusercontent.com 20 raw.githubusercontent.com 30 raw.githubusercontent.com 34 raw.githubusercontent.com 43 raw.githubusercontent.com 48 raw.githubusercontent.com 9 raw.githubusercontent.com 17 raw.githubusercontent.com 21 raw.githubusercontent.com 23 raw.githubusercontent.com 25 raw.githubusercontent.com 32 raw.githubusercontent.com 12 raw.githubusercontent.com 15 raw.githubusercontent.com 18 raw.githubusercontent.com 22 raw.githubusercontent.com 24 raw.githubusercontent.com 37 raw.githubusercontent.com 11 raw.githubusercontent.com 29 raw.githubusercontent.com 36 raw.githubusercontent.com 44 raw.githubusercontent.com 38 raw.githubusercontent.com 41 raw.githubusercontent.com 42 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 powershell.exe 2052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1944 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 30 PID 2316 wrote to memory of 1944 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 30 PID 2316 wrote to memory of 1944 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 30 PID 2316 wrote to memory of 2052 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 32 PID 2316 wrote to memory of 2052 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 32 PID 2316 wrote to memory of 2052 2316 2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '2052-150-0x000001A9BB0E0000-0x000001A9BB0F0000-memory.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HM6JDDSADNL4KI8HSJPE.temp
Filesize7KB
MD504cdecd309bd13c31975cf9af8ddffb1
SHA1b80c80a9a97b18d8c5fa0a6118d7bca5f6c729ef
SHA256a78118f02ce67205e76102dfb96fe539089ad0f32e87a37a21dafdaf3c230d8e
SHA512088275bcdbbb97aa4afbfa682863fd38146c7a9c3e53dbc37cb85bd33f71ff7f202003d8441f342830ff355e5e95ff556f984a4d06a05adfea6070d29f3b1e35