Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 01:52
Behavioral task
behavioral1
Sample
$77Client.exe
Resource
win7-20240903-en
General
-
Target
$77Client.exe
-
Size
56KB
-
MD5
499308c111f6aedc6fc71df066aa3bdd
-
SHA1
edafc28b68a50f1bb3aa49141d64f43618cf8ea6
-
SHA256
e4d4485983a7e13e57f917476bad64d0d4812b9041c86b07f9dddd7a93c61c87
-
SHA512
ac40f8408328d24fe33a9ce03d1c2b87bb3dec5f063e58b2f53942e701126804f8ad71708a938b8e88465a968e8ecdec61930475b7bb6716945ffcb2f4de198a
-
SSDEEP
768:DwoQxEyV72/68RXclX7Yq0QgW+79bk1klbAvdXAypaTCqt68vTXqJ1uOiz4s/bYi:DYKGUrMFY9bk1kU8vx
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3400-1-0x0000000000700000-0x0000000000714000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 3400 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $77Client.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3400 $77Client.exe Token: SeDebugPrivilege 5016 taskmgr.exe Token: SeSystemProfilePrivilege 5016 taskmgr.exe Token: SeCreateGlobalPrivilege 5016 taskmgr.exe Token: 33 5016 taskmgr.exe Token: SeIncBasePriorityPrivilege 5016 taskmgr.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe 5016 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$77Client.exe"C:\Users\Admin\AppData\Local\Temp\$77Client.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 17282⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3400 -ip 34001⤵PID:1600
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5016