Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 18:19
Behavioral task
behavioral1
Sample
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
Resource
win7-20240729-en
General
-
Target
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
-
Size
867KB
-
MD5
a8bd5b655845ba8a23a38abfd7e1bb03
-
SHA1
90b245be80f5beb8b7b0e50bf910e1b4bff1f1cf
-
SHA256
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc
-
SHA512
f560893e04ee817be99c07a42ea654ce3f2ceaddcb3a644094a5316333ce85911f87eb06c10960673d53050e9b4a60410f0c61169c21e203014ba338138ed664
-
SSDEEP
12288:i98NVBjvwSRz04lj4k/GG6yY5adl8M64mzx8B/wmtilK6yEbx9:vV9vT5lj4MGdyY5SWv4mM/eyEr
Malware Config
Extracted
xworm
45.84.199.152:7000
-
Install_directory
%Public%
-
install_file
Msedge.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x00080000000120fe-2.dat family_xworm behavioral1/memory/2780-4-0x0000000000070000-0x00000000000A8000-memory.dmp family_xworm behavioral1/memory/2252-37-0x0000000000BB0000-0x0000000000BE8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1064 powershell.exe 2148 powershell.exe 1412 powershell.exe 2140 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe -
Executes dropped EXE 3 IoCs
pid Process 2780 msedge.exe 2252 Msedge.exe 1592 Msedge.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\msedge.exe f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2412 cmd.exe 2716 cmd.exe -
Kills process with taskkill 4 IoCs
pid Process 2084 taskkill.exe 2176 taskkill.exe 1960 taskkill.exe 1724 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2148 powershell.exe 1412 powershell.exe 2140 powershell.exe 1064 powershell.exe 2780 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 2780 msedge.exe Token: SeDebugPrivilege 2148 powershell.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 2780 msedge.exe Token: SeDebugPrivilege 2252 Msedge.exe Token: SeDebugPrivilege 1592 Msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2564 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 2500 wrote to memory of 2564 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 2500 wrote to memory of 2564 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 2564 wrote to memory of 1960 2564 cmd.exe 32 PID 2564 wrote to memory of 1960 2564 cmd.exe 32 PID 2564 wrote to memory of 1960 2564 cmd.exe 32 PID 2500 wrote to memory of 2412 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2500 wrote to memory of 2412 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2500 wrote to memory of 2412 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2412 wrote to memory of 1724 2412 cmd.exe 35 PID 2412 wrote to memory of 1724 2412 cmd.exe 35 PID 2412 wrote to memory of 1724 2412 cmd.exe 35 PID 2500 wrote to memory of 2716 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 2500 wrote to memory of 2716 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 2500 wrote to memory of 2716 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 2716 wrote to memory of 2084 2716 cmd.exe 37 PID 2716 wrote to memory of 2084 2716 cmd.exe 37 PID 2716 wrote to memory of 2084 2716 cmd.exe 37 PID 2500 wrote to memory of 2236 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2500 wrote to memory of 2236 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2500 wrote to memory of 2236 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2236 wrote to memory of 2176 2236 cmd.exe 39 PID 2236 wrote to memory of 2176 2236 cmd.exe 39 PID 2236 wrote to memory of 2176 2236 cmd.exe 39 PID 2500 wrote to memory of 2504 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2500 wrote to memory of 2504 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2500 wrote to memory of 2504 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2500 wrote to memory of 2772 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2500 wrote to memory of 2772 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2500 wrote to memory of 2772 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2772 wrote to memory of 2780 2772 cmd.exe 42 PID 2772 wrote to memory of 2780 2772 cmd.exe 42 PID 2772 wrote to memory of 2780 2772 cmd.exe 42 PID 2500 wrote to memory of 2864 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2500 wrote to memory of 2864 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2500 wrote to memory of 2864 2500 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2864 wrote to memory of 2888 2864 cmd.exe 44 PID 2864 wrote to memory of 2888 2864 cmd.exe 44 PID 2864 wrote to memory of 2888 2864 cmd.exe 44 PID 2864 wrote to memory of 2848 2864 cmd.exe 45 PID 2864 wrote to memory of 2848 2864 cmd.exe 45 PID 2864 wrote to memory of 2848 2864 cmd.exe 45 PID 2864 wrote to memory of 2788 2864 cmd.exe 46 PID 2864 wrote to memory of 2788 2864 cmd.exe 46 PID 2864 wrote to memory of 2788 2864 cmd.exe 46 PID 2780 wrote to memory of 2148 2780 msedge.exe 48 PID 2780 wrote to memory of 2148 2780 msedge.exe 48 PID 2780 wrote to memory of 2148 2780 msedge.exe 48 PID 2780 wrote to memory of 1412 2780 msedge.exe 50 PID 2780 wrote to memory of 1412 2780 msedge.exe 50 PID 2780 wrote to memory of 1412 2780 msedge.exe 50 PID 2780 wrote to memory of 2140 2780 msedge.exe 52 PID 2780 wrote to memory of 2140 2780 msedge.exe 52 PID 2780 wrote to memory of 2140 2780 msedge.exe 52 PID 2780 wrote to memory of 1064 2780 msedge.exe 54 PID 2780 wrote to memory of 1064 2780 msedge.exe 54 PID 2780 wrote to memory of 1064 2780 msedge.exe 54 PID 2780 wrote to memory of 2728 2780 msedge.exe 56 PID 2780 wrote to memory of 2728 2780 msedge.exe 56 PID 2780 wrote to memory of 2728 2780 msedge.exe 56 PID 1244 wrote to memory of 2252 1244 taskeng.exe 59 PID 1244 wrote to memory of 2252 1244 taskeng.exe 59 PID 1244 wrote to memory of 2252 1244 taskeng.exe 59 PID 1244 wrote to memory of 1592 1244 taskeng.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe"C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM EpicGamesLauncher.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\taskkill.exetaskkill /IM EpicGamesLauncher.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping_BE.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping_BE.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM x64dbg.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\taskkill.exetaskkill /IM x64dbg.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\msedge.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\msedge.exeC:\Windows\msedge.exe3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Msedge" /tr "C:\Users\Public\Msedge.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe" MD53⤵PID:2888
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2848
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2788
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BB637F54-61C6-4918-9247-98E912CE4C97} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ba86d78b65cee433098768f7c811c63
SHA1d92fecaf5c13c810a358b35d1de57849037ac12b
SHA2563f63a1b97ca7bd020d1c9667dadc0ca9a5b6789e231cabeb3bad48c965b233a0
SHA5124179aa8dae0b97eb264f991dd7a750cda8b8337d1325e63c604bccd4f751724c00861e7beaeb871f4032ebb74bdf61cf291c381483ea61674d8fe1b504e0b9b9
-
Filesize
204KB
MD54738e3496a3efe5f19c57b764eb5ba9b
SHA1da9163944b1f51438b2602cbc95660af43172065
SHA256cb51764f19e66bb6accd7f0418332bac7759073ed245f0633dddd53f68e81933
SHA5124cb3029e136471edf2ebb46d1e4fc3a70e5138a5bd4b3fb182b6746d00c69fd5cf8822c0c90c2bcb4d8276db0cecac16ea0198e18a44e755a340495b19cc2238