Analysis
-
max time kernel
479s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 13:54
Behavioral task
behavioral1
Sample
WindowsHost.exe
Resource
win7-20241023-en
General
-
Target
WindowsHost.exe
-
Size
38KB
-
MD5
258eb7d90709b608979e3b0bbd5af620
-
SHA1
d35e9ee78fe5cfa70685d73224a5756629aca0e5
-
SHA256
f590869661358039931036fcd11efede733fd9ef8ded471017f950ce9e173eb1
-
SHA512
7cc264cc757b5e06cc483bf9d56668d24361ad04054d512a85d98ab39c0479e7c86565ac39601eb7c9d1368bf06ac3885b42542c4ea545e73677d1ac2e3de8f7
-
SSDEEP
768:/V7Kjkq9PMXOh5G7m9NFfZk7FWPB9WNOMh2aQkry:/xq/oa5PFyFO9WNOM4sy
Malware Config
Extracted
xworm
5.0
america-surrey.gl.at.ply.gg:54338
uqf0RwmqN0bmwjTI
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/3656-1-0x0000000000EA0000-0x0000000000EB0000-memory.dmp family_xworm behavioral2/files/0x0010000000023adc-23.dat family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk WindowsHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk WindowsHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3656 WindowsHost.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3656 WindowsHost.exe Token: SeDebugPrivilege 3656 WindowsHost.exe Token: SeDebugPrivilege 1932 taskmgr.exe Token: SeSystemProfilePrivilege 1932 taskmgr.exe Token: SeCreateGlobalPrivilege 1932 taskmgr.exe Token: 33 1932 taskmgr.exe Token: SeIncBasePriorityPrivilege 1932 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3656 WindowsHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3656
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5258eb7d90709b608979e3b0bbd5af620
SHA1d35e9ee78fe5cfa70685d73224a5756629aca0e5
SHA256f590869661358039931036fcd11efede733fd9ef8ded471017f950ce9e173eb1
SHA5127cc264cc757b5e06cc483bf9d56668d24361ad04054d512a85d98ab39c0479e7c86565ac39601eb7c9d1368bf06ac3885b42542c4ea545e73677d1ac2e3de8f7
-
Filesize
962B
MD57c5cb74c27648ab7ca85c9a3ef2cbc73
SHA115dd7ac1763e67bdd5f680f24228dbfb0ce6a76b
SHA2565919d1c6379cb7ef533b57f0ac41d65ef94e896a5f5338e531ba84cb5de9ed8b
SHA5120f79d94552de2418eaf4bbe47a693d858ce2d0cc53495a93f8a722f47abc90c02e6a981b9da245cab0c1d30066c76e43526841853ea5eb4531e1c75275d7c5f1