Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe
Resource
win7-20240903-en
General
-
Target
e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe
-
Size
2.9MB
-
MD5
eae9f5ca7a9cc11cdd6da9889fe85f09
-
SHA1
937d8d9e6b2eccc6a504a855353fa7e276f97b71
-
SHA256
e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b
-
SHA512
287b066bc59f9fec75460856f82f5fc4dc3132e6f8e1123932c188feacfbc22b82ec82512cd214eb04b288a06e1776beda2997418e6d6dc462e4b7845515b9ed
-
SSDEEP
49152:CYpiCjKOK0fsrxr6/es0gIfKfkExpNLFeoM6EEk3NsTK8adF:3rK0cxm/d0DUkWVFeoM65NWF
Malware Config
Extracted
xworm
5.0
client-toilet.gl.at.ply.gg:29921
NvsfH1XO1syyGREn
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0003000000012000-7.dat family_xworm behavioral1/memory/2808-13-0x0000000000970000-0x0000000000986000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 2808 BLACKGODDOM V.2 GOD BY LA.exe 2936 Fulloption_V2.1.exe -
Loads dropped DLL 1 IoCs
pid Process 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 BLACKGODDOM V.2 GOD BY LA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2808 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 30 PID 1420 wrote to memory of 2808 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 30 PID 1420 wrote to memory of 2808 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 30 PID 1420 wrote to memory of 2936 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 31 PID 1420 wrote to memory of 2936 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 31 PID 1420 wrote to memory of 2936 1420 e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe"C:\Users\Admin\AppData\Local\Temp\e46b1a61a02ffd168be568e04d497adb2e91b664ea62ee830a2c91f7fec13f6b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\Fulloption_V2.1.exe"C:\Users\Admin\AppData\Local\Temp\Fulloption_V2.1.exe"2⤵
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD52b1bcff698482a45a0d01356ad3e0384
SHA177d106b1495b869600cdfda6afeaec0f75a78634
SHA256a9bd5014b5a6744b0a5c180a3e76ff546a514dcbad8bf2d8c500f903a285424b
SHA512e8b6a729f3b4fc02886aeed232511dc9407a52aae40f01cd2817f8369944b14240bd3edfd573dbdef0d506557f02622148ce4042f6f497c20f1f11af85eeac77
-
Filesize
3.9MB
MD52f6e9c0dd1c6859a9d6e7acea1db9ac0
SHA1b0dcd2be62b6a559e479de7745ab0988b8b30522
SHA256122e3cb0f2ad233d1a364911d433667e7778f00d9a7d10b954c994f4e8093d1f
SHA512fe3634f46afd5b45f0ffc721a18b5ef1b1344b548f90b8c54ea6995e3d64b7394b56c681b1a0522b67e862fce9d8333b621612a2f03708e7dbc917a28c58c15d