Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 04:25

General

  • Target

    Output.exe

  • Size

    883KB

  • MD5

    968a96a052af886b1fcec09332b8fb17

  • SHA1

    c753cb113ae3d58ecdb1681b1297f14452c4899f

  • SHA256

    71fc9d8209f82b251fef2fdeee9a441a739719e5fe66c12883e67b8381f8c11f

  • SHA512

    63483c9b1f1398bd621fb4983ebbabcb33368aa312dabce2db7c1bace15eba4db9609742c8f4b7e0daa769de0a59ad9883e7010e06c1fcb34d722d488a5b4a91

  • SSDEEP

    24576:OSAf8tUxkKfeR40FLYylkHD6kAhgJY9roBpbO7Jf:kOUx8RF/lkjqhg/Da7Jf

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:32758

pressure-continuous.gl.at.ply.gg:32758

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Output.exe
    "C:\Users\Admin\AppData\Local\Temp\Output.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Roaming\Bootstrapper.exe
      "C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\system32\cmd.exe
        "cmd" /c ipconfig /all
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Windows\system32\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:2756
      • C:\Windows\system32\cmd.exe
        "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2652
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\XClient.exe

    Filesize

    73KB

    MD5

    6d4182ea1fbd49787b224fbcea6f82c5

    SHA1

    3a171db86c09f48993dc55bb6fff7a95c07c3054

    SHA256

    1c56708ee56861f0237812f8a96809eda1ef90d02ccb9df21a6ab1ca0d0933ed

    SHA512

    089b87bed28d3e77bd79925d7073d8d02157cbe8071c3c4e68efe9912fa9423a6e8c25038dd85c256c80f9b5d580674d6bda89652edfef89e8a2233acddd0000

  • \Users\Admin\AppData\Roaming\Bootstrapper.exe

    Filesize

    800KB

    MD5

    2a4dcf20b82896be94eb538260c5fb93

    SHA1

    21f232c2fd8132f8677e53258562ad98b455e679

    SHA256

    ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a

    SHA512

    4f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288

  • memory/1788-12-0x00000000001E0000-0x00000000001F8000-memory.dmp

    Filesize

    96KB

  • memory/1788-15-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp

    Filesize

    9.9MB

  • memory/1788-17-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-14-0x0000000000B60000-0x0000000000C2E000-memory.dmp

    Filesize

    824KB

  • memory/2536-0-0x000007FEF56B3000-0x000007FEF56B4000-memory.dmp

    Filesize

    4KB

  • memory/2536-1-0x0000000001020000-0x0000000001104000-memory.dmp

    Filesize

    912KB