Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 20:48

General

  • Target

    ZeroxStealerInstaller.exe

  • Size

    2.9MB

  • MD5

    9b1a7d9403b93f7a390d953c2785a9ed

  • SHA1

    0246222a9290cd73bfda0e402722a82d04507a43

  • SHA256

    97b156f53366d0aac2e46c97b8f7bb3efb1a541e0a923aed24c0f8e7d4c4ee25

  • SHA512

    fdf61c48deee07db3563859a934fd9238c3ed33bd68b180fbf46d121b233359b69d3ec6c370f0ca17bbdb444ec8a784985d54a06704dfe1ea22701124b0fc4b0

  • SSDEEP

    49152:qvo+8aGzQqDRtQH/vpxWIfKgVgVKkbmNoi7r+ogPpkZs/ohvc8q8IzIWvuA8KXAb:qh83dRtMvb/KgVLNNwRkVhBNIzWvKo

Score
10/10

Malware Config

Extracted

Family

xworm

C2

lijaligibidu-35558.portmap.host:35558

127.0.0.1:28019

chilhoek-28019.portmap.host:28019

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Security.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZeroxStealerInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\ZeroxStealerInstaller.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe
      "C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2040
    • C:\Users\Admin\AppData\Roaming\XClient (2).exe
      "C:\Users\Admin\AppData\Roaming\XClient (2).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1956
    • C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe
      "C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe

    Filesize

    75KB

    MD5

    cf219a189dae4a022f26dd58cd5367e6

    SHA1

    76c2e7b756e894afc4e5fd7267fce398d58c518f

    SHA256

    725c0bcdb953e39e96a0192d2712b261541647259e494c583d19697a10d2ffbe

    SHA512

    21dc7cdd5ea07be708a5c696708207a1760851d2fbb608969254a8f3e806bbb87b6b27a4d5f4cecf1b5d90f6fc81759fd9f6222ddafdb955d41b0333ea085f1f

  • C:\Users\Admin\AppData\Roaming\XClient (2).exe

    Filesize

    81KB

    MD5

    c1b7e4e3a25be04cc93a44017bd58298

    SHA1

    b40e7d99a41bd49172cd23470ccb4387b3351942

    SHA256

    9f36f62ffb252f041490ccf9faf344e03a7987a566cc399f0be06e4e5e60fbcb

    SHA512

    4192250e78e0a3440e2b5d1b7782566a55d96fa8a68877ff8869f617ce3095374289c78ea3d200082fb91efb8fcbce8fea946fcfea08cef05265a2c3512f99cf

  • C:\Users\Admin\AppData\Roaming\ZeroxStealerInstaller.exe

    Filesize

    2.7MB

    MD5

    e4468845f3b426403f3223a1b18cf858

    SHA1

    9cea44a892f83e660d56a69bc97af2c094b2f087

    SHA256

    7cebe983265c3a77b2a369b56edd521733e9103f1a42fd09dcaf5abf5dd547bd

    SHA512

    c4703c2f3f0bb92020b4d920d5ba2e6ba7e505ae736bc7b4d5289ed8b3faff3748061f731e6f6ecf0aa6d78eccbfa187175a07f54bd7e4b97345f8bc91080840

  • memory/108-1-0x00000000013A0000-0x0000000001690000-memory.dmp

    Filesize

    2.9MB

  • memory/108-0-0x000007FEF54B3000-0x000007FEF54B4000-memory.dmp

    Filesize

    4KB

  • memory/1956-13-0x0000000000E70000-0x0000000000E8A000-memory.dmp

    Filesize

    104KB

  • memory/2040-10-0x0000000000DD0000-0x0000000000DE8000-memory.dmp

    Filesize

    96KB

  • memory/2040-24-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2040-26-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2288-21-0x00000000011C0000-0x0000000001486000-memory.dmp

    Filesize

    2.8MB

  • memory/2288-22-0x000000001B530000-0x000000001B67E000-memory.dmp

    Filesize

    1.3MB

  • memory/2288-23-0x0000000000240000-0x0000000000254000-memory.dmp

    Filesize

    80KB

  • memory/2288-25-0x000000001B780000-0x000000001B996000-memory.dmp

    Filesize

    2.1MB