Analysis

  • max time kernel
    33s
  • max time network
    35s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17-11-2024 15:15

General

  • Target

    Galleon.exe

  • Size

    116KB

  • MD5

    4f0c8a81138b78a1f40ef1d383632130

  • SHA1

    96b6c6ff5c5b1aa90014e975bb851d23acbed598

  • SHA256

    4560c263255a3f4682b69a3e989591ee4b4df60a8a7680a3905c0c7b33a83d42

  • SHA512

    687dddf2a070acbb5eee3af912dc1461968a67b05992f76f5a77a5bb0d773ae1049c7e44386c4a44d5971ace7784a8601c2fc3f47f1f8dbbb06a7e04646bbf1c

  • SSDEEP

    3072:oziOToQz31V4b1pCoLd7H7dwsIc6rmGBLYdLrfncO:+ToQzFjox7bCs5WmGVYVrfn

Malware Config

Extracted

Family

xworm

C2

left-noon.gl.at.ply.gg:60705

Attributes
  • Install_directory

    %AppData%

  • install_file

    US11B.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Galleon.exe
    "C:\Users\Admin\AppData\Local\Temp\Galleon.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Users\Admin\AppData\Local\Temp\Galleon.exe
      "C:\Users\Admin\AppData\Local\Temp\Galleon.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\sms57C5.tmp
        "C:\Users\Admin\AppData\Local\Temp\sms57C5.tmp"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\sms57C5.tmp'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4264
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'sms57C5.tmp'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3544
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\sms57C5.tmp'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2628
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "sms57C5" /tr "C:\Users\Admin\AppData\Roaming\sms57C5.tmp"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:348
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:772
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3eb3833f769dd890afc295b977eab4b4

      SHA1

      e857649b037939602c72ad003e5d3698695f436f

      SHA256

      c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

      SHA512

      c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      c67441dfa09f61bca500bb43407c56b8

      SHA1

      5a56cf7cbeb48c109e2128c31b681fac3959157b

      SHA256

      63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

      SHA512

      325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      391aed54d51fd5fbbbe405fdc716566a

      SHA1

      47dceec138978f898b0a78f53f9b226c86c4d22d

      SHA256

      1c0e8ea7ebd38a68ee2b5ff94923b2f7309c565a5e8b841f9adccc1b5dbc7eaf

      SHA512

      06cd1de1330cfc728cf2a91096f3302d86f7943fc9832e3a2d1f541c02b48be4e512d98230894117bfe46b6f5297ccf0c78beb59f9b3377e605851e5d395406b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3bt0axl2.cet.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\sms57C5.tmp

      Filesize

      77KB

      MD5

      8032a5e68376a879472c297749cdb4c4

      SHA1

      d6a96c5287f1d76b41f605ecaeb1688d208c720a

      SHA256

      fa3dd88248218cd597232333c70e0996801817b003c234994102452712a23d1d

      SHA512

      b75d6429844e643fc7920efe1d30b15b0e631ded561f5f0021e105a68a729ebf308a23501c9136efbf4637bb068dba5c0056ff85195cd54d56e05205193d6c21

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sms57C5.lnk

      Filesize

      771B

      MD5

      3610e659b4b017b4a42c4bb73bc470e0

      SHA1

      4a6700465632d56201b28d0a648c4584c75ba056

      SHA256

      b557b4abf306f01ab18889bee553fa0bbbc320d3dac6850a014895a1aa5b5de1

      SHA512

      80a111e9438ed34bf88ca6a9f0991b28b6bdc388b4dd4df9768615227a56230bb41b4e1d7f1285cf84d530276981792bab61f262140d57e062d0fd26bb8602aa

    • memory/772-50-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-46-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-47-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-48-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-49-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-51-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-45-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-39-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-40-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/772-41-0x0000028CA1E40000-0x0000028CA1E41000-memory.dmp

      Filesize

      4KB

    • memory/3504-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3504-3-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3504-4-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3788-1-0x00007FF7F1460000-0x00007FF7F148A000-memory.dmp

      Filesize

      168KB

    • memory/4068-11-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB

    • memory/4068-10-0x0000000000D90000-0x0000000000DAA000-memory.dmp

      Filesize

      104KB

    • memory/4068-66-0x00007FFEAF433000-0x00007FFEAF435000-memory.dmp

      Filesize

      8KB

    • memory/4068-9-0x00007FFEAF433000-0x00007FFEAF435000-memory.dmp

      Filesize

      8KB

    • memory/4068-74-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB

    • memory/4068-75-0x000000001BAA0000-0x000000001BAAC000-memory.dmp

      Filesize

      48KB

    • memory/4264-23-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB

    • memory/4264-22-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB

    • memory/4264-21-0x00000284F67B0000-0x00000284F67D2000-memory.dmp

      Filesize

      136KB

    • memory/4264-24-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB

    • memory/4264-27-0x00007FFEAF430000-0x00007FFEAFEF2000-memory.dmp

      Filesize

      10.8MB