Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bqkriy6l.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
bqkriy6l.exe
-
Size
1.4MB
-
MD5
72a6fe522fd7466bf2e2ac9daf40a806
-
SHA1
b0164b9dfee039798191de85a96db7ac54538d02
-
SHA256
771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
-
SHA512
b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
SSDEEP
24576:9lh9OZjjhYvYjQJABLaR5nyAMqIvGPSFyPHCA2c8UkHBSDzJ4u:fhwZjjhYvYTLaPy+IvG6FHAk8DzJ4u
Malware Config
Extracted
Family
xworm
Version
5.0
C2
38.180.203.11:1010
Mutex
LE5ccvPhTtoUBuJ2
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2884-9-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2884-14-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2884-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2884-12-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2884-10-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 2884 3048 bqkriy6l.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqkriy6l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3048 bqkriy6l.exe Token: SeDebugPrivilege 2884 MSBuild.exe Token: SeDebugPrivilege 2680 Powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2884 3048 bqkriy6l.exe 31 PID 3048 wrote to memory of 2680 3048 bqkriy6l.exe 32 PID 3048 wrote to memory of 2680 3048 bqkriy6l.exe 32 PID 3048 wrote to memory of 2680 3048 bqkriy6l.exe 32 PID 3048 wrote to memory of 2680 3048 bqkriy6l.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bqkriy6l.exe"C:\Users\Admin\AppData\Local\Temp\bqkriy6l.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\bqkriy6l.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe'2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-