Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/11/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
MythoxCheats.exe
Resource
win7-20240903-en
General
-
Target
MythoxCheats.exe
-
Size
3.9MB
-
MD5
0a237b5441585a97c5be411c8c255fb4
-
SHA1
5996a18a2702b37a4a90a2e5a5a36bb2ea468b0c
-
SHA256
775d1aedd10e9b235c016071c063b31f03c30e5ec665b45bab20c91f9f7f2e24
-
SHA512
8201ffd7fd7351f20788bd96388a7e2073d368f380ada45ccb3aa574ac1f2fd7f1a3d6568096734cc0e7bc9cadda42b2d6253b0872fd8d43e0f4ae43a4739402
-
SSDEEP
98304:b4FY5aHCXBgMsW9fYfdGpZ8WPfotjICkvunySH:06Q8iM/9lqCfoxz
Malware Config
Extracted
xworm
127.0.0.1:28019
chilhoek-28019.portmap.host:28019
lijaligibidu-35558.portmap.host:35558
-
Install_directory
%AppData%
-
install_file
svhost.exe
-
telegram
https://api.telegram.org/bot7460505018:AAGtMNP89kfVCbpYBPLkO5O4JcFb8YqssUk
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023cc7-5.dat family_xworm behavioral2/files/0x0008000000023cca-17.dat family_xworm behavioral2/memory/3784-22-0x0000000000100000-0x000000000011A000-memory.dmp family_xworm behavioral2/memory/1848-29-0x00000000003F0000-0x0000000000408000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation MythoxCheats.exe -
Executes dropped EXE 3 IoCs
pid Process 3784 XClient (1).exe 1848 WindowsSecurity.exe 2804 NovaManagerInstaller.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS NovaManagerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer NovaManagerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion NovaManagerInstaller.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3784 XClient (1).exe Token: SeDebugPrivilege 1848 WindowsSecurity.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3784 4248 MythoxCheats.exe 86 PID 4248 wrote to memory of 3784 4248 MythoxCheats.exe 86 PID 4248 wrote to memory of 1848 4248 MythoxCheats.exe 87 PID 4248 wrote to memory of 1848 4248 MythoxCheats.exe 87 PID 4248 wrote to memory of 2804 4248 MythoxCheats.exe 88 PID 4248 wrote to memory of 2804 4248 MythoxCheats.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\MythoxCheats.exe"C:\Users\Admin\AppData\Local\Temp\MythoxCheats.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Roaming\XClient (1).exe"C:\Users\Admin\AppData\Roaming\XClient (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Users\Admin\AppData\Roaming\NovaManagerInstaller.exe"C:\Users\Admin\AppData\Roaming\NovaManagerInstaller.exe"2⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD54d0438297aedcf3351e2399ee7b9a034
SHA16b37d1a0f585c6b056b98196c13662a588d3f5e6
SHA256fe4845b2f864fa1f62d04e185237aa7434d031072e601a1b5e3acee09dc66e91
SHA51260d85bf1ad55302ab94baa30137a00eff52d08faaffe18f0a098998d11fd79cfd4ad4bc220f2565b076bd44022ae44532cc78035d46dc8bddbf6f461ab16c5a0
-
Filesize
75KB
MD5cf219a189dae4a022f26dd58cd5367e6
SHA176c2e7b756e894afc4e5fd7267fce398d58c518f
SHA256725c0bcdb953e39e96a0192d2712b261541647259e494c583d19697a10d2ffbe
SHA51221dc7cdd5ea07be708a5c696708207a1760851d2fbb608969254a8f3e806bbb87b6b27a4d5f4cecf1b5d90f6fc81759fd9f6222ddafdb955d41b0333ea085f1f
-
Filesize
81KB
MD5c1b7e4e3a25be04cc93a44017bd58298
SHA1b40e7d99a41bd49172cd23470ccb4387b3351942
SHA2569f36f62ffb252f041490ccf9faf344e03a7987a566cc399f0be06e4e5e60fbcb
SHA5124192250e78e0a3440e2b5d1b7782566a55d96fa8a68877ff8869f617ce3095374289c78ea3d200082fb91efb8fcbce8fea946fcfea08cef05265a2c3512f99cf