Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 21:41
Behavioral task
behavioral1
Sample
3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe
Resource
win10v2004-20241007-en
General
-
Target
3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe
-
Size
67KB
-
MD5
ecc0117da91937168d95f94fe2b28840
-
SHA1
f7c1c88b17173f9403536d0ca1fdfdbb108436e9
-
SHA256
3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e
-
SHA512
b5ed48db56c494396f8002dd61dbc10ca38f3487a9117549b43d3c59a4e580b5e3dc084b62eb5e0b7fc82900bfab79168bf394bab0de76b6971f45f6c84dbb4c
-
SSDEEP
1536:RbCAX3g4GePVcAye7hC+bu/uwdVedefBRfa6GMO9RDc:JLg+cAX7hC+bu/9mauMOfQ
Malware Config
Extracted
xworm
0.tcp.ap.ngrok.io:12725
-
Install_directory
%Temp%
-
install_file
hh.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2188-1-0x0000000000A90000-0x0000000000AA8000-memory.dmp family_xworm behavioral1/files/0x000d00000001225e-30.dat family_xworm behavioral1/memory/328-32-0x0000000000B40000-0x0000000000B58000-memory.dmp family_xworm behavioral1/memory/2092-34-0x00000000010A0000-0x00000000010B8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1880 powershell.exe 2872 powershell.exe 2636 powershell.exe 2256 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 328 hh.exe 2092 hh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\hh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hh.exe" 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 0.tcp.ap.ngrok.io 10 0.tcp.ap.ngrok.io 19 0.tcp.ap.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1880 powershell.exe 2872 powershell.exe 2636 powershell.exe 2256 powershell.exe 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe Token: SeDebugPrivilege 328 hh.exe Token: SeDebugPrivilege 2092 hh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1880 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 30 PID 2188 wrote to memory of 1880 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 30 PID 2188 wrote to memory of 1880 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 30 PID 2188 wrote to memory of 2872 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 32 PID 2188 wrote to memory of 2872 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 32 PID 2188 wrote to memory of 2872 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 32 PID 2188 wrote to memory of 2636 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 34 PID 2188 wrote to memory of 2636 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 34 PID 2188 wrote to memory of 2636 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 34 PID 2188 wrote to memory of 2256 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 36 PID 2188 wrote to memory of 2256 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 36 PID 2188 wrote to memory of 2256 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 36 PID 2188 wrote to memory of 1844 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 38 PID 2188 wrote to memory of 1844 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 38 PID 2188 wrote to memory of 1844 2188 3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe 38 PID 2096 wrote to memory of 328 2096 taskeng.exe 41 PID 2096 wrote to memory of 328 2096 taskeng.exe 41 PID 2096 wrote to memory of 328 2096 taskeng.exe 41 PID 2096 wrote to memory of 2092 2096 taskeng.exe 42 PID 2096 wrote to memory of 2092 2096 taskeng.exe 42 PID 2096 wrote to memory of 2092 2096 taskeng.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe"C:\Users\Admin\AppData\Local\Temp\3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '3cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\hh.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'hh.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hh" /tr "C:\Users\Admin\AppData\Local\Temp\hh.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1844
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D48F544A-C963-48B0-B9AC-7C68117CCBAB} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5ecc0117da91937168d95f94fe2b28840
SHA1f7c1c88b17173f9403536d0ca1fdfdbb108436e9
SHA2563cc41a56daee0331512d04dd40e33676820a11615a0f808cb812d496b3fc3a8e
SHA512b5ed48db56c494396f8002dd61dbc10ca38f3487a9117549b43d3c59a4e580b5e3dc084b62eb5e0b7fc82900bfab79168bf394bab0de76b6971f45f6c84dbb4c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5490056b07e770b7eda933510eb2227ff
SHA166a105e7e1109dfcfb3766c3f983a760a2caa26b
SHA256dc10499bfa07750c444fab02804bf5c6c822892759be15f67e85c54487144173
SHA5127e9eefc64da223fbf8255193d6bd08a769616cc1700eb300084a0e8ea6c4383781a5094434a05f1dec986a6a96fb0e83378b1069fb5dd635fe95fd7f137f7947