Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 16:39

General

  • Target

    Bootstrapper.exe

  • Size

    889KB

  • MD5

    4a38f2fd264d3753024a560d0aaaa299

  • SHA1

    0e1bbf0e5fd66a4b731af686966f220d8b31e0e9

  • SHA256

    22164bae356ca295b6591f06832d663b48fe71ecf14cac212e446ce28bc27114

  • SHA512

    68208d1b48c5be93501426f37eb3582b30c5f4752d0addd614c8a51edeec4c9abebd44894163d30f0f437631e0b96657060ff81ad8a0e60dbe4b17d933352956

  • SSDEEP

    12288:SiJzQUyRS7vjzyGaL94l68NoS/S3iorPzSCH8MGSD2vKo7pnyzRyRB4c/YP8Mp1c:SiJsUG2KGaZ4OSa3hBH83S2pgzNbGp

Malware Config

Extracted

Family

xworm

C2

hrgj7va.localto.net:5261

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\Admin\AppData\Roaming\FluxusV1.2"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1780
    • C:\Users\Admin\AppData\Roaming\Bootstrapper.exe
      "C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\system32\cmd.exe
        "cmd" /c ipconfig /all
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\system32\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:2884
      • C:\Windows\system32\cmd.exe
        "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2308
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2804 -s 1152
        3⤵
        • Loads dropped DLL
        PID:1116
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {698321DD-8998-4794-8629-F6E0BC90C7D2} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Users\Admin\AppData\Roaming\FluxusV1.2
      C:\Users\Admin\AppData\Roaming\FluxusV1.2
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\Admin\AppData\Roaming\FluxusV1.2"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:812
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /f /tn "FluxusV1"
        3⤵
          PID:1636
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB220.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:1496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB220.tmp.bat

      Filesize

      155B

      MD5

      d3746965bab412d0955693d90a119ebc

      SHA1

      1caa9c387d97968d79a8bfd9a457cc4107ea103d

      SHA256

      3b139d67441a5440ece0ee821f07cfe9c4e18718c476b5ada43527813e7cc5f8

      SHA512

      f8d7a0d375bd867ee81579fd3b73bcc07a25e1953c0b4256eb7574675a258bd6812ce4eef131e95689e3d34ebc66b34ac8fd87249bbc4ab3985005062fb084d0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FluxusV1.lnk

      Filesize

      687B

      MD5

      8403048540f36541e6dc03b8dea10a31

      SHA1

      90a3236a41cf2741d26a8734479b2e26f1151a39

      SHA256

      8aa7bb11671310b647ea56830d387efce4cbef7ea7f9f15d08f093dc1c148620

      SHA512

      1a6e9c6386acf46a3c98179e8a9825dc64060ff00e6e5fa2d388fcb06922b8f20da2fb698e2c3cdc63e7995c6734e3c033e3cd5e6152c4830cc359d29c8b0757

    • C:\Users\Admin\AppData\Roaming\XClient.exe

      Filesize

      75KB

      MD5

      5d85f2a61188a38acfc4d2a12d206578

      SHA1

      09f0dcc4fc1de3ffff40f00461ed03bcd419ffaa

      SHA256

      4511294c021f344430101977fe4c2d8923682d4b1bb09d5cb10e98076538f33b

      SHA512

      7aca24699c68ee4094d42ac4e25ba35847d22a22dc6c912660c41eed7a1eb89b8de1e6dd6122e869e187590add354ad745ac2f372bf037b81df81788e176a58e

    • \Users\Admin\AppData\Roaming\Bootstrapper.exe

      Filesize

      800KB

      MD5

      2a4dcf20b82896be94eb538260c5fb93

      SHA1

      21f232c2fd8132f8677e53258562ad98b455e679

      SHA256

      ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a

      SHA512

      4f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288

    • memory/2144-33-0x0000000001220000-0x000000000123A000-memory.dmp

      Filesize

      104KB

    • memory/2200-15-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2200-20-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2200-21-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2200-27-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2200-29-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2200-9-0x0000000000950000-0x000000000096A000-memory.dmp

      Filesize

      104KB

    • memory/2536-0-0x000007FEF55F3000-0x000007FEF55F4000-memory.dmp

      Filesize

      4KB

    • memory/2536-1-0x0000000000B60000-0x0000000000C44000-memory.dmp

      Filesize

      912KB

    • memory/2804-14-0x0000000001150000-0x000000000121E000-memory.dmp

      Filesize

      824KB