Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 23:39
Behavioral task
behavioral1
Sample
7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe
Resource
win7-20241010-en
General
-
Target
7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe
-
Size
63KB
-
MD5
754c64b6e93a932952e1d86b66213486
-
SHA1
f23268af58f8b4758e1a98619fa4640139c88e99
-
SHA256
7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25
-
SHA512
16417885aaf1a72b4c58d9bb3e5bc1b55692ac9ad0d963397ac27f53c982aaf9a07d1efce8ab37479b73157b8bbb678f94bfeff5b0fc27d3784e5cdd1704555f
-
SSDEEP
1536:jv0nbrF7oGDVxO13pmjLpgTC1Vsy9bAGS5bHIeS1Uc6WOTSXnTe:jvjCzO1UFky9bAGwjuyAOTKK
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
smartscreen.exe
-
telegram
https://api.telegram.org/bot8033290183:AAFGRm9tWSgOpPIATZ1BFGl9qpuLMlAya54/sendMessage?chat_id=8085766327
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/804-1-0x0000000001030000-0x0000000001046000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2556 powershell.exe 2888 powershell.exe 2780 powershell.exe 2788 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smartscreen.lnk 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smartscreen.lnk 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2556 powershell.exe 2888 powershell.exe 2780 powershell.exe 2788 powershell.exe 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 804 wrote to memory of 2556 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 31 PID 804 wrote to memory of 2556 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 31 PID 804 wrote to memory of 2556 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 31 PID 804 wrote to memory of 2888 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 33 PID 804 wrote to memory of 2888 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 33 PID 804 wrote to memory of 2888 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 33 PID 804 wrote to memory of 2780 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 35 PID 804 wrote to memory of 2780 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 35 PID 804 wrote to memory of 2780 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 35 PID 804 wrote to memory of 2788 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 37 PID 804 wrote to memory of 2788 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 37 PID 804 wrote to memory of 2788 804 7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe"C:\Users\Admin\AppData\Local\Temp\7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe"1⤵
- Drops startup file
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\smartscreen.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'smartscreen.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59360e94ddc4024b1e9e50d4a2db0fdfc
SHA1f964cd425bab29aab4417a6ca9a533bc1e71bcb4
SHA25640fb6e451a7641b5da731f6129e5f554ecefb0cc10c6fd44429762e071b6c4a3
SHA5120a67be170adb83896d4863af52e03028b2678b7386af878eaee1337a09cb3c3995980ad600bde20322b63184145d502e72f52eb18d902f657ad4d18a114ea30b