Analysis

  • max time kernel
    6s
  • max time network
    9s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-11-2024 07:27

General

  • Target

    XBinderOutput.exe

  • Size

    61KB

  • MD5

    be47b3d2e81e3fbae1e8034caa6e4b81

  • SHA1

    612e0a8881176d9b7a74ae9653ed48a180221a0d

  • SHA256

    dc55486f92004381b246358ee4a1fa94359258dea19d9f600bf1d4a3a1f05cef

  • SHA512

    9edef77118aa36224f03f04135152a3afbd83e80166f8e8461ab7c02ed32ed505fa4c5c26a623a4b57472d59f2e947ef878c00798382d2c6b1a1c0ac1b5678cd

  • SSDEEP

    1536:SWBJbLzKbbUbMGhwEhlo1o4mDH2P4QoM9F:xJbcUwGiEf4mDH2AQoM9F

Malware Config

Extracted

Family

xworm

C2

about-publishing.gl.at.ply.gg:49157

Attributes
  • Install_directory

    %AppData%

  • install_file

    update.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe
    "C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /F /TN "eheheh" /SC ONLOGON /TR "C:\Windows\System32\eheheh.exe" /RL HIGHEST
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:240
    • C:\Windows\System32\eheheh.exe
      "C:\Windows\System32\eheheh.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\eheheh.exe

    Filesize

    83KB

    MD5

    6bb17f4042738219708a1fcd785b2f20

    SHA1

    7b7f33f12a9a7602ad2b1128ca51b4336c63bf8b

    SHA256

    52f750c805eb0d8d1175b9b648bc6e458bcbb33048c864d8e064099c44addfa1

    SHA512

    f4c22bc88e3644621fcc2853562e8312a4b68c673148742b0cae3c54c0e7c80f19c31d9d32114a385fabb1248740467b19bea1ab0d6d05c42ca35878e4c8e8e6

  • memory/3068-0-0x00007FFC85053000-0x00007FFC85055000-memory.dmp

    Filesize

    8KB

  • memory/3068-1-0x0000000000BA0000-0x0000000000BB6000-memory.dmp

    Filesize

    88KB

  • memory/3068-4-0x00007FFC85050000-0x00007FFC85B12000-memory.dmp

    Filesize

    10.8MB

  • memory/3068-16-0x00007FFC85050000-0x00007FFC85B12000-memory.dmp

    Filesize

    10.8MB

  • memory/5108-17-0x00007FFC85050000-0x00007FFC85B12000-memory.dmp

    Filesize

    10.8MB

  • memory/5108-18-0x0000000000850000-0x000000000086C000-memory.dmp

    Filesize

    112KB

  • memory/5108-19-0x00007FFC85050000-0x00007FFC85B12000-memory.dmp

    Filesize

    10.8MB

  • memory/5108-20-0x00007FFC85050000-0x00007FFC85B12000-memory.dmp

    Filesize

    10.8MB