Analysis

  • max time kernel
    29s
  • max time network
    17s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    09-11-2024 23:42

General

  • Target

    KING_BOTTLE.exe

  • Size

    105KB

  • MD5

    5ee059c0e66dbcf5eaac208829cf73fb

  • SHA1

    4582948195572f2ac0428bfd0cb1708bf7297d4d

  • SHA256

    873b8992d43241a737721a289679e2c51e46ce705b5b74fd1df8e4062d7892bc

  • SHA512

    5b6b543072c73ebcc71ab9c5da88a288df0d6e3cac4828e9627440768e5a52e8b7493cba7d4bfd6aee17158665bdc92cda3dcd5e3967d88495aed8245c155cdb

  • SSDEEP

    1536:/cp9JeddKdZ9JImr2RF4a9ZhH3D3LKvGHsmt7y/gXqzKUJC9TCw0llAnJ:12jlyRF4a9ZhrIm9qHJC9TCw0bAnJ

Malware Config

Extracted

Family

xworm

C2

45.141.26.214:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 15 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KING_BOTTLE.exe
    "C:\Users\Admin\AppData\Local\Temp\KING_BOTTLE.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\ProgramData\svchost.exe
      "C:\ProgramData\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\KING_BOTTLE.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\system32\mode.com
        Mode 153,45
        3⤵
          PID:396
        • C:\Windows\system32\reg.exe
          Reg.exe add HKLM /F
          3⤵
          • Modifies registry key
          PID:2472
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
          3⤵
            PID:3016
          • C:\Windows\system32\mode.com
            Mode 153,45
            3⤵
              PID:3348
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:4260
              • C:\Windows\system32\mode.com
                mode con lines=2 cols=90
                3⤵
                  PID:1748
                • C:\Windows\system32\mode.com
                  Mode 137,50
                  3⤵
                    PID:2712
                  • C:\Windows\system32\mode.com
                    Mode 153,45
                    3⤵
                      PID:1792
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      3⤵
                        PID:2588
                      • C:\Windows\system32\mode.com
                        mode con lines=2 cols=90
                        3⤵
                          PID:4372
                        • C:\Windows\system32\bcdedit.exe
                          bcdedit -set disabledynamictick yes
                          3⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1824
                        • C:\Windows\system32\bcdedit.exe
                          bcdedit -set useplatformtick yes
                          3⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1800
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          PowerShell "ForEach($v in (Get-Command -Name \"Set-ProcessMitigation\").Parameters[\"Disable\"].Attributes.ValidValues){Set-ProcessMitigation -System -Disable $v.ToString() -ErrorAction SilentlyContinue}"
                          3⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Hide Artifacts: Ignore Process Interrupts
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2452
                        • C:\Windows\system32\netsh.exe
                          netsh int tcp show global
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:1032
                        • C:\Windows\system32\netsh.exe
                          netsh int tcp set global chimney=enabled
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:3704
                        • C:\Windows\system32\netsh.exe
                          netsh int tcp set heuristics disabled
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:2276
                        • C:\Windows\system32\netsh.exe
                          netsh int tcp set global autotuninglevel=normal
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:784
                        • C:\Windows\system32\netsh.exe
                          netsh int tcp set global congestionprovider=ctcp
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:3084
                        • C:\Windows\system32\ipconfig.exe
                          ipconfig /flushdns
                          3⤵
                          • Gathers network information
                          PID:4512
                        • C:\Windows\system32\ipconfig.exe
                          ipconfig /flushdns
                          3⤵
                          • Gathers network information
                          PID:3260

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\KING_BOTTLE.bat

                      Filesize

                      17KB

                      MD5

                      69bcb8045611c1459e9ca93f88009c81

                      SHA1

                      40865dd415f4eae3bffd182f3c068315857880a9

                      SHA256

                      0f66c49cad93925f51152867a98a1a95b1d200cafc45f2e9c32afba66a337d0b

                      SHA512

                      b81154684924482db06261933258bd5109de63e21be31c7cfa708946987b86a36db71f8123e9bb5d8876f402384cb3497ec34dc8bd717cefcffdafdfc755ea40

                    • C:\ProgramData\svchost.exe

                      Filesize

                      75KB

                      MD5

                      907e3316a9311d08c09eaae41b3d078f

                      SHA1

                      0052c133e8f0af426f90c4b755dc7781e24f1b83

                      SHA256

                      2850f31537516c0df7461fa946cc45e77b3af27ae0eca69c541f9a11399c31c0

                      SHA512

                      6330763ac1fd2363279b4f5dc1cdf25ea1306cfe0e3c60cd09cec6dba91031ab28b936e2a7c15ba495de0c031d6fc41429c33dcd02a2cc9dfb4cc9c566f59734

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KING_BOTTLE.exe.log

                      Filesize

                      654B

                      MD5

                      11c6e74f0561678d2cf7fc075a6cc00c

                      SHA1

                      535ee79ba978554abcb98c566235805e7ea18490

                      SHA256

                      d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                      SHA512

                      32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      e30544e6d048b2c1c6129c89835c16dd

                      SHA1

                      21d167ff64825d3f8a5c351c3160b670dc14cb60

                      SHA256

                      df0fcfba7ccb03bac0ccf6941f9cc512937fdc63035a2fedc78aa9a82c1d8af1

                      SHA512

                      fcfc1e2b4110286dc8ede8caab34ea309e24fa6deb225213ab0e5b2d6499cc195e65dde2e125bca3ef5d5b5f4fdda66a1e4429cf2ea1c3df0ba92142342dfd9b

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oamd5h2j.sko.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • memory/1476-0-0x00007FF9AC323000-0x00007FF9AC325000-memory.dmp

                      Filesize

                      8KB

                    • memory/1476-1-0x0000000000820000-0x0000000000840000-memory.dmp

                      Filesize

                      128KB

                    • memory/2452-27-0x0000017448530000-0x0000017448552000-memory.dmp

                      Filesize

                      136KB

                    • memory/2452-37-0x0000017460FC0000-0x0000017460FDE000-memory.dmp

                      Filesize

                      120KB

                    • memory/2688-21-0x00000000003A0000-0x00000000003BA000-memory.dmp

                      Filesize

                      104KB

                    • memory/2688-24-0x00007FF9AC320000-0x00007FF9ACDE2000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2688-26-0x00007FF9AC320000-0x00007FF9ACDE2000-memory.dmp

                      Filesize

                      10.8MB