Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
KING_BOTTLE.exe
Resource
win7-20240903-en
General
-
Target
KING_BOTTLE.exe
-
Size
105KB
-
MD5
5ee059c0e66dbcf5eaac208829cf73fb
-
SHA1
4582948195572f2ac0428bfd0cb1708bf7297d4d
-
SHA256
873b8992d43241a737721a289679e2c51e46ce705b5b74fd1df8e4062d7892bc
-
SHA512
5b6b543072c73ebcc71ab9c5da88a288df0d6e3cac4828e9627440768e5a52e8b7493cba7d4bfd6aee17158665bdc92cda3dcd5e3967d88495aed8245c155cdb
-
SSDEEP
1536:/cp9JeddKdZ9JImr2RF4a9ZhH3D3LKvGHsmt7y/gXqzKUJC9TCw0llAnJ:12jlyRF4a9ZhrIm9qHJC9TCw0bAnJ
Malware Config
Extracted
xworm
45.141.26.214:7000
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a00000001225d-4.dat family_xworm behavioral1/memory/2240-15-0x0000000001340000-0x000000000135A000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 2240 svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2568 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2240 3016 KING_BOTTLE.exe 30 PID 3016 wrote to memory of 2240 3016 KING_BOTTLE.exe 30 PID 3016 wrote to memory of 2240 3016 KING_BOTTLE.exe 30 PID 3016 wrote to memory of 2708 3016 KING_BOTTLE.exe 31 PID 3016 wrote to memory of 2708 3016 KING_BOTTLE.exe 31 PID 3016 wrote to memory of 2708 3016 KING_BOTTLE.exe 31 PID 2708 wrote to memory of 2900 2708 cmd.exe 33 PID 2708 wrote to memory of 2900 2708 cmd.exe 33 PID 2708 wrote to memory of 2900 2708 cmd.exe 33 PID 2708 wrote to memory of 2568 2708 cmd.exe 34 PID 2708 wrote to memory of 2568 2708 cmd.exe 34 PID 2708 wrote to memory of 2568 2708 cmd.exe 34 PID 2708 wrote to memory of 2432 2708 cmd.exe 35 PID 2708 wrote to memory of 2432 2708 cmd.exe 35 PID 2708 wrote to memory of 2432 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 36 PID 2708 wrote to memory of 2896 2708 cmd.exe 36 PID 2708 wrote to memory of 2896 2708 cmd.exe 36 PID 2708 wrote to memory of 2676 2708 cmd.exe 37 PID 2708 wrote to memory of 2676 2708 cmd.exe 37 PID 2708 wrote to memory of 2676 2708 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\KING_BOTTLE.exe"C:\Users\Admin\AppData\Local\Temp\KING_BOTTLE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\KING_BOTTLE.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\mode.comMode 153,453⤵PID:2900
-
-
C:\Windows\system32\reg.exeReg.exe add HKLM /F3⤵
- Modifies registry key
PID:2568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"3⤵PID:2432
-
-
C:\Windows\system32\mode.comMode 153,453⤵PID:2896
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD569bcb8045611c1459e9ca93f88009c81
SHA140865dd415f4eae3bffd182f3c068315857880a9
SHA2560f66c49cad93925f51152867a98a1a95b1d200cafc45f2e9c32afba66a337d0b
SHA512b81154684924482db06261933258bd5109de63e21be31c7cfa708946987b86a36db71f8123e9bb5d8876f402384cb3497ec34dc8bd717cefcffdafdfc755ea40
-
Filesize
75KB
MD5907e3316a9311d08c09eaae41b3d078f
SHA10052c133e8f0af426f90c4b755dc7781e24f1b83
SHA2562850f31537516c0df7461fa946cc45e77b3af27ae0eca69c541f9a11399c31c0
SHA5126330763ac1fd2363279b4f5dc1cdf25ea1306cfe0e3c60cd09cec6dba91031ab28b936e2a7c15ba495de0c031d6fc41429c33dcd02a2cc9dfb4cc9c566f59734