Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
KING WEAPON.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
KING WEAPON.exe
Resource
win10v2004-20241007-en
General
-
Target
KING WEAPON.exe
-
Size
653KB
-
MD5
0c873d832bcfb08d023fca6ebe0e22de
-
SHA1
0b18147315d176ed302ce2a3af814ad630831302
-
SHA256
ebae2bd3c854a82d65b0db827fff81940e4a5876c9a536a7612fa3bedb38480a
-
SHA512
1309e69d1ca57643946528b7747d40b5b2ab3f9c7c29168470afb690983813f8bf981a72f4e5f5ddd81260594ef3c8e37753eea13d75905b7c7e49db049faaf8
-
SSDEEP
12288:+Vq3hWyjefPaWZE/sNG2c64EvUOMW2UgSgaMDOH8ogiSkXsXBhOdaEoIwEb59pJB:k7yjeHcr9O+O
Malware Config
Extracted
xworm
5.0
client-toilet.gl.at.ply.gg:29921
NvsfH1XO1syyGREn
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016c23-10.dat family_xworm behavioral1/memory/2932-13-0x0000000001090000-0x00000000010A6000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 3 IoCs
pid Process 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 2932 BLACKGODDOM V.2 GOD BY LA.exe 1408 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1668 KING WEAPON.exe 1408 Process not Found -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 BLACKGODDOM V.2 GOD BY LA.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2040 1668 KING WEAPON.exe 31 PID 1668 wrote to memory of 2040 1668 KING WEAPON.exe 31 PID 1668 wrote to memory of 2040 1668 KING WEAPON.exe 31 PID 1668 wrote to memory of 2932 1668 KING WEAPON.exe 32 PID 1668 wrote to memory of 2932 1668 KING WEAPON.exe 32 PID 1668 wrote to memory of 2932 1668 KING WEAPON.exe 32 PID 2040 wrote to memory of 1484 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 35 PID 2040 wrote to memory of 1484 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 35 PID 2040 wrote to memory of 1484 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 35 PID 2040 wrote to memory of 2120 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 37 PID 2040 wrote to memory of 2120 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 37 PID 2040 wrote to memory of 2120 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 37 PID 2040 wrote to memory of 3020 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 39 PID 2040 wrote to memory of 3020 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 39 PID 2040 wrote to memory of 3020 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 39 PID 2040 wrote to memory of 2212 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 41 PID 2040 wrote to memory of 2212 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 41 PID 2040 wrote to memory of 2212 2040 ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\KING WEAPON.exe"C:\Users\Admin\AppData\Local\Temp\KING WEAPON.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe"C:\Users\Admin\AppData\Local\Temp\ตัวนี้ GUI โง่ๆที่มันสั่งโหลด.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exe"cmd.exe"3⤵PID:1484
-
-
C:\Windows\system32\cmd.exe"cmd.exe"3⤵PID:2120
-
-
C:\Windows\system32\cmd.exe"cmd.exe"3⤵PID:3020
-
-
C:\Windows\system32\cmd.exe"cmd.exe"3⤵PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"C:\Users\Admin\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD52b1bcff698482a45a0d01356ad3e0384
SHA177d106b1495b869600cdfda6afeaec0f75a78634
SHA256a9bd5014b5a6744b0a5c180a3e76ff546a514dcbad8bf2d8c500f903a285424b
SHA512e8b6a729f3b4fc02886aeed232511dc9407a52aae40f01cd2817f8369944b14240bd3edfd573dbdef0d506557f02622148ce4042f6f497c20f1f11af85eeac77
-
Filesize
1.8MB
MD5571bb5e3f78c76c7dd43278ca1e53fb9
SHA1821eb31c4d1cb4403354c5bf4c0fedbdb26c3f09
SHA2569397aa1401b570445268ec8f95816e1cd4ccb9937e90645e2f5b5630bbd4fb26
SHA51243b4c93c87fdec905e826cfead9cf7ff4b138ee077b1ff3d3314f5b12c617b6c322933650d168ece76b47b4d2f8300dd25022addd1b2c3fb7edfbd2110f84b6f