Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
FullOptionFivemFree2024NEW.exe
Resource
win7-20241010-en
General
-
Target
FullOptionFivemFree2024NEW.exe
-
Size
3.9MB
-
MD5
679df4417fc2227844b44878d7de7743
-
SHA1
d21a53d46aef380de82f584c5ab0a6fe83f52163
-
SHA256
795936e455d9816df8dc97b8d2653c711a9084dd887dcc6ae857f11493b1b270
-
SHA512
e1a13722728c1b8d3b8518b7467dedeb4b74fcd8a011a8429e7203490ccf9d3ec3396e127b9b16a78ea2935cf1110d7a57d1c52aed368e94f3223496fe24f0c6
-
SSDEEP
98304:O+/27mY8Whua/AOQtRWxNRNXqsSCWQmL3Ah/iw:OaYua/ANeXNXcQRZ
Malware Config
Extracted
xworm
45.141.26.194:7000
-
Install_directory
%ProgramData%
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2988-12-0x00000000008C0000-0x00000000008DA000-memory.dmp family_xworm behavioral1/files/0x0014000000016fc9-11.dat family_xworm behavioral1/memory/2192-46-0x0000000000FB0000-0x0000000000FCA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2312 powershell.exe 2956 powershell.exe 2788 powershell.exe 2936 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Registry.lnk guest-tool.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Registry.lnk guest-tool.exe -
Executes dropped EXE 4 IoCs
pid Process 2856 FULLOPTION.exe 2988 guest-tool.exe 2192 Registry 2384 Registry -
Loads dropped DLL 1 IoCs
pid Process 2904 FullOptionFivemFree2024NEW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry = "C:\\ProgramData\\Registry" guest-tool.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2788 powershell.exe 2936 powershell.exe 2312 powershell.exe 2956 powershell.exe 2988 guest-tool.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2988 guest-tool.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2988 guest-tool.exe Token: SeDebugPrivilege 2192 Registry Token: SeDebugPrivilege 2384 Registry -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 guest-tool.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2856 2904 FullOptionFivemFree2024NEW.exe 29 PID 2904 wrote to memory of 2856 2904 FullOptionFivemFree2024NEW.exe 29 PID 2904 wrote to memory of 2856 2904 FullOptionFivemFree2024NEW.exe 29 PID 2904 wrote to memory of 2988 2904 FullOptionFivemFree2024NEW.exe 30 PID 2904 wrote to memory of 2988 2904 FullOptionFivemFree2024NEW.exe 30 PID 2904 wrote to memory of 2988 2904 FullOptionFivemFree2024NEW.exe 30 PID 2988 wrote to memory of 2788 2988 guest-tool.exe 32 PID 2988 wrote to memory of 2788 2988 guest-tool.exe 32 PID 2988 wrote to memory of 2788 2988 guest-tool.exe 32 PID 2988 wrote to memory of 2936 2988 guest-tool.exe 34 PID 2988 wrote to memory of 2936 2988 guest-tool.exe 34 PID 2988 wrote to memory of 2936 2988 guest-tool.exe 34 PID 2988 wrote to memory of 2312 2988 guest-tool.exe 36 PID 2988 wrote to memory of 2312 2988 guest-tool.exe 36 PID 2988 wrote to memory of 2312 2988 guest-tool.exe 36 PID 2988 wrote to memory of 2956 2988 guest-tool.exe 38 PID 2988 wrote to memory of 2956 2988 guest-tool.exe 38 PID 2988 wrote to memory of 2956 2988 guest-tool.exe 38 PID 2988 wrote to memory of 2212 2988 guest-tool.exe 40 PID 2988 wrote to memory of 2212 2988 guest-tool.exe 40 PID 2988 wrote to memory of 2212 2988 guest-tool.exe 40 PID 2480 wrote to memory of 2192 2480 taskeng.exe 43 PID 2480 wrote to memory of 2192 2480 taskeng.exe 43 PID 2480 wrote to memory of 2192 2480 taskeng.exe 43 PID 2480 wrote to memory of 2384 2480 taskeng.exe 44 PID 2480 wrote to memory of 2384 2480 taskeng.exe 44 PID 2480 wrote to memory of 2384 2480 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FullOptionFivemFree2024NEW.exe"C:\Users\Admin\AppData\Local\Temp\FullOptionFivemFree2024NEW.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Public\FULLOPTION.exe"C:\Users\Public\FULLOPTION.exe"2⤵
- Executes dropped EXE
PID:2856
-
-
C:\Users\Public\guest-tool.exe"C:\Users\Public\guest-tool.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\guest-tool.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'guest-tool.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Registry'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Registry'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Registry" /tr "C:\ProgramData\Registry"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2212
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C4677452-FB8A-4881-A5FA-DD82F726624A} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\ProgramData\RegistryC:\ProgramData\Registry2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\ProgramData\RegistryC:\ProgramData\Registry2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e334e10e6a28d6d893bef0beb0c8225c
SHA1f3d2b5a911dbd941b910760dab5f1d7cb2343bbb
SHA25618aefbb449de14d9b316a8c2b3dafd5d77c33ff922effea0013bb2114429b7c4
SHA5125bd243a0cd6fb39e29724fc8ecfa1c0f28c64785cfeb6f59daba63042cc8d02b73dee4f603498d8b0dcc9029ade07fafed0188a9063a46ed78815d75e090f642
-
Filesize
3.9MB
MD58bc3bef3b25f503aff956735680ee173
SHA176916bad2964bf481ebe891932911eb5f9f4f288
SHA25691a0c2becd82339bc45f56e43b5f32f422ce1c51360c5a3c3fdde244afd48dba
SHA51271e9abd586466b1730d29808bdf77a4a5a5659cd1fe1ca53fea8dddf859ba0f7a7da1a517305ec57edd09245e8efaa5c3d7ec97a2203e3315374a4331ce5b4a9
-
Filesize
76KB
MD5e32aaac90783d442e17c1fbd31767aee
SHA1b2974be4d00d6dbee9d98b43fd830adc9261f1a7
SHA256cedd1466f8c37294b89f0afed68a00125e34d839f56aa8241d3692c7376c9a0e
SHA512f2c2a826c384c5a6f83447d48b54afe990ef8df5c0228dcf15946d5c5e2637bf288ef072cc5e9e7cd3fd9302170360bf792e8deb89af93b405d7a9c15dc71096