Analysis
-
max time kernel
1563s -
max time network
1568s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 06:15
Behavioral task
behavioral1
Sample
NLHybrid Fixer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NLHybrid Fixer.exe
Resource
win10v2004-20241007-en
General
-
Target
NLHybrid Fixer.exe
-
Size
42KB
-
MD5
269085c7755574a5cd840b298a0b4a55
-
SHA1
3b20a9f3c0e5ed34d37c5c915c07fd93da7d7cbd
-
SHA256
ee94f31406ba029502b3737f9d2c2d2d22448643deaa3095239a55b58b9169c8
-
SHA512
47b5782e53cf03bb5eb8f96584b9e0608bc10038b8721761bf67af75ed0b77a2e51ef94a9d62302e6e0d45885e72d47b80815caa8c063a616d50b646885b5f65
-
SSDEEP
768:yvD19vXwj/0OhWgEiymT+jxPuqF3t9NRX6POChM0LevH:I19/wj/F8iy/P5F99NRX6POCK0k
Malware Config
Extracted
xworm
5.0
remote-newest.gl.at.ply.gg:62113
fund-scared.gl.at.ply.gg:62113
UrM5eoX12ULh6st6
-
Install_directory
%Userprofile%
-
install_file
win64updater.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2332-1-0x0000000001390000-0x00000000013A0000-memory.dmp family_xworm behavioral1/files/0x000b00000001225f-34.dat family_xworm behavioral1/memory/1672-36-0x0000000001210000-0x0000000001220000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2720 powershell.exe 2308 powershell.exe 2768 powershell.exe 2784 powershell.exe -
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win64updater.lnk NLHybrid Fixer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win64updater.lnk NLHybrid Fixer.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 win64updater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\win64updater = "C:\\Users\\Admin\\win64updater.exe" NLHybrid Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1128 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2332 NLHybrid Fixer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2308 powershell.exe 2768 powershell.exe 2784 powershell.exe 2720 powershell.exe 2332 NLHybrid Fixer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2332 NLHybrid Fixer.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2332 NLHybrid Fixer.exe Token: SeDebugPrivilege 1672 win64updater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 NLHybrid Fixer.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2308 2332 NLHybrid Fixer.exe 31 PID 2332 wrote to memory of 2308 2332 NLHybrid Fixer.exe 31 PID 2332 wrote to memory of 2308 2332 NLHybrid Fixer.exe 31 PID 2332 wrote to memory of 2768 2332 NLHybrid Fixer.exe 33 PID 2332 wrote to memory of 2768 2332 NLHybrid Fixer.exe 33 PID 2332 wrote to memory of 2768 2332 NLHybrid Fixer.exe 33 PID 2332 wrote to memory of 2784 2332 NLHybrid Fixer.exe 35 PID 2332 wrote to memory of 2784 2332 NLHybrid Fixer.exe 35 PID 2332 wrote to memory of 2784 2332 NLHybrid Fixer.exe 35 PID 2332 wrote to memory of 2720 2332 NLHybrid Fixer.exe 37 PID 2332 wrote to memory of 2720 2332 NLHybrid Fixer.exe 37 PID 2332 wrote to memory of 2720 2332 NLHybrid Fixer.exe 37 PID 2332 wrote to memory of 3004 2332 NLHybrid Fixer.exe 39 PID 2332 wrote to memory of 3004 2332 NLHybrid Fixer.exe 39 PID 2332 wrote to memory of 3004 2332 NLHybrid Fixer.exe 39 PID 1064 wrote to memory of 1672 1064 taskeng.exe 43 PID 1064 wrote to memory of 1672 1064 taskeng.exe 43 PID 1064 wrote to memory of 1672 1064 taskeng.exe 43 PID 2332 wrote to memory of 2164 2332 NLHybrid Fixer.exe 44 PID 2332 wrote to memory of 2164 2332 NLHybrid Fixer.exe 44 PID 2332 wrote to memory of 2164 2332 NLHybrid Fixer.exe 44 PID 2332 wrote to memory of 2864 2332 NLHybrid Fixer.exe 46 PID 2332 wrote to memory of 2864 2332 NLHybrid Fixer.exe 46 PID 2332 wrote to memory of 2864 2332 NLHybrid Fixer.exe 46 PID 2864 wrote to memory of 1128 2864 cmd.exe 48 PID 2864 wrote to memory of 1128 2864 cmd.exe 48 PID 2864 wrote to memory of 1128 2864 cmd.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer.exe"C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NLHybrid Fixer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\win64updater.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'win64updater.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "win64updater" /tr "C:\Users\Admin\win64updater.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "win64updater"2⤵PID:2164
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB5C8.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1128
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {25692E8A-F1F9-4F53-9079-33203AFA3BB7} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\win64updater.exeC:\Users\Admin\win64updater.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5f9d25fafcedc4262d44f86db72bbef62
SHA1252f1c5cd55544a84939e6995d2b56a949534700
SHA256d09e1dd50c9e2ad58e83fdd2d1ba4afc5c1c383990aa4a8737a2168c5a80598c
SHA51269a5019b9b1c4740f2fb94e65c0b1a219a24eb95d43313b2d26b9c10077fc8dd28afcf591c4cc7fa965a501418eeef02f45b7559563676ffcdfd57026a4a0e1e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B82YDCNZ7JUOMLPE7OYC.temp
Filesize7KB
MD546f41e06e56cde5dd25ad8dffa778da6
SHA105ab3fcf51b055eaf6f13ff48d956d7a13a76e05
SHA2561f704c4a0edb1797b280b0fe038de73807b0057063f6a53e20d229b9aff8e61d
SHA51258d8908c969f483ca26707585b6ddc9b1de27bfe0ba3fc735e8345cfc9bd248fea9d12f3318f58020ab67fa4660004f697438f503d20f63168070c46dbb0cb67
-
Filesize
42KB
MD5269085c7755574a5cd840b298a0b4a55
SHA13b20a9f3c0e5ed34d37c5c915c07fd93da7d7cbd
SHA256ee94f31406ba029502b3737f9d2c2d2d22448643deaa3095239a55b58b9169c8
SHA51247b5782e53cf03bb5eb8f96584b9e0608bc10038b8721761bf67af75ed0b77a2e51ef94a9d62302e6e0d45885e72d47b80815caa8c063a616d50b646885b5f65