Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-11-2024 09:32
General
-
Target
Farm V4.exe
-
Size
202KB
-
MD5
21aa61c9a708dc4424bd852695e2d735
-
SHA1
1a5c7c7925793b5d7bf86a88d8ef0b95817be803
-
SHA256
ff13a9cbc22cd025ec564ba7eccd9cb6f45364c6adbf670a17618260f4021cf1
-
SHA512
895148feecf978c0f3925f3e3413322d5d510a3f6aa63e0938a98ab4e3be0edfbc52cf36f9dd876b5fde56a386474d84413ce1334c3217e8115b1c402a60bcf8
-
SSDEEP
1536:XhTvNkGgZtCuobKabBCBXJLf4nw6GbROWyW7pNcrS+NyxU0/N:XhzN6KTbBCBXpBbROWyqkS+Ai0V
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
Install_directory
%AppData%
-
install_file
ไฟหกฟหก.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2324-1-0x0000000000E30000-0x0000000000E68000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2324 Farm V4.exe Token: SeDebugPrivilege 1964 taskmgr.exe Token: SeSystemProfilePrivilege 1964 taskmgr.exe Token: SeCreateGlobalPrivilege 1964 taskmgr.exe Token: 33 1964 taskmgr.exe Token: SeIncBasePriorityPrivilege 1964 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Farm V4.exe"C:\Users\Admin\AppData\Local\Temp\Farm V4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1964