Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/11/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
MythoxCheats.exe
Resource
win7-20240903-en
General
-
Target
MythoxCheats.exe
-
Size
3.9MB
-
MD5
0a237b5441585a97c5be411c8c255fb4
-
SHA1
5996a18a2702b37a4a90a2e5a5a36bb2ea468b0c
-
SHA256
775d1aedd10e9b235c016071c063b31f03c30e5ec665b45bab20c91f9f7f2e24
-
SHA512
8201ffd7fd7351f20788bd96388a7e2073d368f380ada45ccb3aa574ac1f2fd7f1a3d6568096734cc0e7bc9cadda42b2d6253b0872fd8d43e0f4ae43a4739402
-
SSDEEP
98304:b4FY5aHCXBgMsW9fYfdGpZ8WPfotjICkvunySH:06Q8iM/9lqCfoxz
Malware Config
Extracted
xworm
127.0.0.1:28019
chilhoek-28019.portmap.host:28019
lijaligibidu-35558.portmap.host:35558
-
Install_directory
%AppData%
-
install_file
svhost.exe
-
telegram
https://api.telegram.org/bot7460505018:AAGtMNP89kfVCbpYBPLkO5O4JcFb8YqssUk
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000b00000001225a-5.dat family_xworm behavioral1/memory/3036-15-0x00000000002C0000-0x00000000002DA000-memory.dmp family_xworm behavioral1/memory/2092-14-0x0000000000F70000-0x0000000000F88000-memory.dmp family_xworm behavioral1/files/0x0008000000015d7f-11.dat family_xworm -
Xworm family
-
Executes dropped EXE 3 IoCs
pid Process 3036 XClient (1).exe 2092 WindowsSecurity.exe 2800 NovaManagerInstaller.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS NovaManagerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer NovaManagerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion NovaManagerInstaller.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2092 WindowsSecurity.exe Token: SeDebugPrivilege 3036 XClient (1).exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3036 2384 MythoxCheats.exe 30 PID 2384 wrote to memory of 3036 2384 MythoxCheats.exe 30 PID 2384 wrote to memory of 3036 2384 MythoxCheats.exe 30 PID 2384 wrote to memory of 2092 2384 MythoxCheats.exe 31 PID 2384 wrote to memory of 2092 2384 MythoxCheats.exe 31 PID 2384 wrote to memory of 2092 2384 MythoxCheats.exe 31 PID 2384 wrote to memory of 2800 2384 MythoxCheats.exe 32 PID 2384 wrote to memory of 2800 2384 MythoxCheats.exe 32 PID 2384 wrote to memory of 2800 2384 MythoxCheats.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\MythoxCheats.exe"C:\Users\Admin\AppData\Local\Temp\MythoxCheats.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\XClient (1).exe"C:\Users\Admin\AppData\Roaming\XClient (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\NovaManagerInstaller.exe"C:\Users\Admin\AppData\Roaming\NovaManagerInstaller.exe"2⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD54d0438297aedcf3351e2399ee7b9a034
SHA16b37d1a0f585c6b056b98196c13662a588d3f5e6
SHA256fe4845b2f864fa1f62d04e185237aa7434d031072e601a1b5e3acee09dc66e91
SHA51260d85bf1ad55302ab94baa30137a00eff52d08faaffe18f0a098998d11fd79cfd4ad4bc220f2565b076bd44022ae44532cc78035d46dc8bddbf6f461ab16c5a0
-
Filesize
75KB
MD5cf219a189dae4a022f26dd58cd5367e6
SHA176c2e7b756e894afc4e5fd7267fce398d58c518f
SHA256725c0bcdb953e39e96a0192d2712b261541647259e494c583d19697a10d2ffbe
SHA51221dc7cdd5ea07be708a5c696708207a1760851d2fbb608969254a8f3e806bbb87b6b27a4d5f4cecf1b5d90f6fc81759fd9f6222ddafdb955d41b0333ea085f1f
-
Filesize
81KB
MD5c1b7e4e3a25be04cc93a44017bd58298
SHA1b40e7d99a41bd49172cd23470ccb4387b3351942
SHA2569f36f62ffb252f041490ccf9faf344e03a7987a566cc399f0be06e4e5e60fbcb
SHA5124192250e78e0a3440e2b5d1b7782566a55d96fa8a68877ff8869f617ce3095374289c78ea3d200082fb91efb8fcbce8fea946fcfea08cef05265a2c3512f99cf