Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
ORDER DRAWING AND PHOTOS.exe
Resource
win7-20240903-en
General
-
Target
ORDER DRAWING AND PHOTOS.exe
-
Size
2.0MB
-
MD5
395bb950d2979e4c3911d90852c06345
-
SHA1
2a693150907af200bbf8582a69e663d23249c7d0
-
SHA256
1adbc19898a40ae7f2c6fd9a6d1c502c7152ba6b04d4584e2c7476606f9b24ff
-
SHA512
d95b46177b0820f286e99f647ff398788d24502885fc2b63fe19dfb1a58d7ae15cabd2749ab00b709b37a3fb75b9ccf28628ad2f686a507fc1142486a8f32b61
-
SSDEEP
12288:xkNH+OOlsur4fwML7K6yD210eS+Fl1DkjGKUuU6Sn:mH+D+Hb3K6yD22eTl1oj1UYq
Malware Config
Extracted
xworm
5.0
weidmachane.zapto.org:7000
Y3sPpIW4xQztdVfl
-
install_file
USB.exe
Extracted
latentbot
weidmachane.zapto.org
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2412-13-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2412-11-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2412-9-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2412-7-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2412-6-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Latentbot family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2412-19-0x0000000005D20000-0x0000000005E40000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 CasPol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 2412 1832 ORDER DRAWING AND PHOTOS.exe 31 PID 1832 wrote to memory of 852 1832 ORDER DRAWING AND PHOTOS.exe 32 PID 1832 wrote to memory of 852 1832 ORDER DRAWING AND PHOTOS.exe 32 PID 1832 wrote to memory of 852 1832 ORDER DRAWING AND PHOTOS.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER DRAWING AND PHOTOS.exe"C:\Users\Admin\AppData\Local\Temp\ORDER DRAWING AND PHOTOS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1832 -s 6162⤵PID:852
-