Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 12:04
Behavioral task
behavioral1
Sample
lamysoft.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
lamysoft.exe
Resource
win10v2004-20241007-en
General
-
Target
lamysoft.exe
-
Size
115KB
-
MD5
e716953f2f1a17a9e1e00d03c022267e
-
SHA1
7f63945c042018d1688c77abc4d6c171b763a527
-
SHA256
7e61107c764e924e2e7b2dfca37bf2d8f6c440014a92e69bdd6d70ae84dde8c8
-
SHA512
450a53a41bd517faf298728efabd599fc983caa3197e9a04e6674179ca0d26e7cd92341033ae71ebd3ab40277b997cf9923b596a9498dbddfd0ebc62186a2449
-
SSDEEP
3072:2G1gT1mBpTl5JcIdm++b8IaGGWxBOo9gn/Ufv3hsX:2GGm3LJJdmnbzaGZ3S/iv3
Malware Config
Extracted
xworm
127.0.0.1:47359
23.ip.gl.ply.gg:47359
-
Install_directory
%AppData%
-
install_file
rat.exe
-
telegram
https://api.telegram.org/bot7327399950:AAEE8XHvYDeAYqClq1sW-CApcW7Mmn1gxoQ/sendMessage?chat_id=7223021103
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2920-1-0x0000000000100000-0x0000000000124000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2676 powershell.exe 2940 powershell.exe 2444 powershell.exe 1108 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rat.lnk lamysoft.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rat.lnk lamysoft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\rat = "C:\\Users\\Admin\\AppData\\Roaming\\rat.exe" lamysoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2676 powershell.exe 2940 powershell.exe 2444 powershell.exe 1108 powershell.exe 2920 lamysoft.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2920 lamysoft.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 2920 lamysoft.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 lamysoft.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2676 2920 lamysoft.exe 30 PID 2920 wrote to memory of 2676 2920 lamysoft.exe 30 PID 2920 wrote to memory of 2676 2920 lamysoft.exe 30 PID 2920 wrote to memory of 2940 2920 lamysoft.exe 32 PID 2920 wrote to memory of 2940 2920 lamysoft.exe 32 PID 2920 wrote to memory of 2940 2920 lamysoft.exe 32 PID 2920 wrote to memory of 2444 2920 lamysoft.exe 34 PID 2920 wrote to memory of 2444 2920 lamysoft.exe 34 PID 2920 wrote to memory of 2444 2920 lamysoft.exe 34 PID 2920 wrote to memory of 1108 2920 lamysoft.exe 36 PID 2920 wrote to memory of 1108 2920 lamysoft.exe 36 PID 2920 wrote to memory of 1108 2920 lamysoft.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\lamysoft.exe"C:\Users\Admin\AppData\Local\Temp\lamysoft.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\lamysoft.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'lamysoft.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\rat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'rat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bbe05fbd3299eed614c74d9161fe5a9f
SHA131a3260058abfb6e891e3d1992373374a80a42a0
SHA256f900fcf67f269b3672cebcd889b4d720c9228b9c92aeeacca5e2a0c392e68491
SHA51258699d93aea8382b75971c77809a91777835dc13521f3c4532de425420ae3ae0ba003f14e2dcb962d3dbe414a9c8420ff29e36964e151c10255aeedfdee5574d