Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 20:05

General

  • Target

    boot/Output.exe

  • Size

    19.1MB

  • MD5

    1e1f058b9022cd3a95060cff1b1cf210

  • SHA1

    3918d00edeaa189b0eac34b9eb488ef7f2c422a3

  • SHA256

    4d220efb35e831a8663e0ab732846b70857ed6562928f22cd4bfc65dc5246a85

  • SHA512

    b30d994bce280300743eb7b193407970b116c49d0afef9de2124c467fa5bc2c18e4bb8ff2dba65e179dab07f7bf854fd4bd8185ee1e80cdc4689fc8d24fb4edc

  • SSDEEP

    393216:aBSZCeuEixoVYUZoQ6QzhFFkgzGAtJe2x5uubfweKOZZpk4v:aM86ixofhkyGWe2LZjpf

Malware Config

Extracted

Family

xworm

Version

5.0

C2

89.213.177.171:7000

Mutex

QSt8Afyc7zR2PwtO

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    VLC_Medai.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\boot\Output.exe
    "C:\Users\Admin\AppData\Local\Temp\boot\Output.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\run.exe
      "C:\Users\Admin\AppData\Local\Temp\run.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\run.exe
        "C:\Users\Admin\AppData\Local\Temp\run.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1016
    • C:\Users\Admin\AppData\Local\Temp\api.exe
      "C:\Users\Admin\AppData\Local\Temp\api.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI22682\python312.dll

    Filesize

    6.6MB

    MD5

    3c388ce47c0d9117d2a50b3fa5ac981d

    SHA1

    038484ff7460d03d1d36c23f0de4874cbaea2c48

    SHA256

    c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb

    SHA512

    e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35

  • C:\Users\Admin\AppData\Local\Temp\api.exe

    Filesize

    50KB

    MD5

    5cfd28dd440ab2a776e877730bba5f43

    SHA1

    dc2acd133a6db45f57ad69192ac1aa8464bf8d0d

    SHA256

    badcd1409afadc7ead84161997c00fbfd4d061c399d685f98a84fe8702aa4b96

    SHA512

    2cf2d505263deac9c6a9e4d93d756a81aee9ae7ac270fd0780a1809b05810e05839a5635517d65a75a22718eb7069cc94303493c9cccc369fc8bc6bf12e7be40

  • C:\Users\Admin\AppData\Local\Temp\run.exe

    Filesize

    19.0MB

    MD5

    effd88481a995ffd0373f8de89e30e55

    SHA1

    e06def72e760f6400ccc6a52ea0051b36e279988

    SHA256

    2c74260e7fae9e538da537943f4691df875791a730d688af5dcd89d2a529fa48

    SHA512

    9491b92a8c4241bfb49db2944f065b39922166ca6540d929bac25ae002f8649e3220da19e26b2cd03069a3bb148268cab478d3b88106ebd78907ff89025b054c

  • memory/2756-12-0x0000000000A90000-0x0000000000AA2000-memory.dmp

    Filesize

    72KB

  • memory/2756-61-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

    Filesize

    9.9MB

  • memory/2756-980-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

    Filesize

    9.9MB

  • memory/2756-1941-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-0-0x000007FEF5FB3000-0x000007FEF5FB4000-memory.dmp

    Filesize

    4KB

  • memory/2792-1-0x0000000001140000-0x0000000002462000-memory.dmp

    Filesize

    19.1MB