Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 02:53
Behavioral task
behavioral1
Sample
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
Resource
win7-20241010-en
General
-
Target
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
-
Size
867KB
-
MD5
a8bd5b655845ba8a23a38abfd7e1bb03
-
SHA1
90b245be80f5beb8b7b0e50bf910e1b4bff1f1cf
-
SHA256
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc
-
SHA512
f560893e04ee817be99c07a42ea654ce3f2ceaddcb3a644094a5316333ce85911f87eb06c10960673d53050e9b4a60410f0c61169c21e203014ba338138ed664
-
SSDEEP
12288:i98NVBjvwSRz04lj4k/GG6yY5adl8M64mzx8B/wmtilK6yEbx9:vV9vT5lj4MGdyY5SWv4mM/eyEr
Malware Config
Extracted
xworm
45.84.199.152:7000
-
Install_directory
%Public%
-
install_file
Msedge.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012266-2.dat family_xworm behavioral1/memory/2816-4-0x0000000000E80000-0x0000000000EB8000-memory.dmp family_xworm behavioral1/memory/2128-35-0x00000000013B0000-0x00000000013E8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2456 powershell.exe 2700 powershell.exe 2832 powershell.exe 2336 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe -
Executes dropped EXE 3 IoCs
pid Process 2816 msedge.exe 2128 Msedge.exe 816 Msedge.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\msedge.exe f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 568 cmd.exe 2924 cmd.exe -
Kills process with taskkill 4 IoCs
pid Process 2864 taskkill.exe 2876 taskkill.exe 2208 taskkill.exe 3064 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2456 powershell.exe 2700 powershell.exe 2832 powershell.exe 2336 powershell.exe 2816 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 2876 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeDebugPrivilege 2816 msedge.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2816 msedge.exe Token: SeDebugPrivilege 2128 Msedge.exe Token: SeDebugPrivilege 816 Msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1272 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 2528 wrote to memory of 1272 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 2528 wrote to memory of 1272 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 31 PID 1272 wrote to memory of 2864 1272 cmd.exe 32 PID 1272 wrote to memory of 2864 1272 cmd.exe 32 PID 1272 wrote to memory of 2864 1272 cmd.exe 32 PID 2528 wrote to memory of 2924 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2528 wrote to memory of 2924 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2528 wrote to memory of 2924 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 34 PID 2924 wrote to memory of 2876 2924 cmd.exe 35 PID 2924 wrote to memory of 2876 2924 cmd.exe 35 PID 2924 wrote to memory of 2876 2924 cmd.exe 35 PID 2528 wrote to memory of 568 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 2528 wrote to memory of 568 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 2528 wrote to memory of 568 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 36 PID 568 wrote to memory of 2208 568 cmd.exe 37 PID 568 wrote to memory of 2208 568 cmd.exe 37 PID 568 wrote to memory of 2208 568 cmd.exe 37 PID 2528 wrote to memory of 2964 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2528 wrote to memory of 2964 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2528 wrote to memory of 2964 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 38 PID 2964 wrote to memory of 3064 2964 cmd.exe 39 PID 2964 wrote to memory of 3064 2964 cmd.exe 39 PID 2964 wrote to memory of 3064 2964 cmd.exe 39 PID 2528 wrote to memory of 1988 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2528 wrote to memory of 1988 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2528 wrote to memory of 1988 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 40 PID 2528 wrote to memory of 2908 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2528 wrote to memory of 2908 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2528 wrote to memory of 2908 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 41 PID 2908 wrote to memory of 2816 2908 cmd.exe 42 PID 2908 wrote to memory of 2816 2908 cmd.exe 42 PID 2908 wrote to memory of 2816 2908 cmd.exe 42 PID 2528 wrote to memory of 2992 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2528 wrote to memory of 2992 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2528 wrote to memory of 2992 2528 f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe 43 PID 2992 wrote to memory of 2772 2992 cmd.exe 44 PID 2992 wrote to memory of 2772 2992 cmd.exe 44 PID 2992 wrote to memory of 2772 2992 cmd.exe 44 PID 2992 wrote to memory of 2780 2992 cmd.exe 45 PID 2992 wrote to memory of 2780 2992 cmd.exe 45 PID 2992 wrote to memory of 2780 2992 cmd.exe 45 PID 2992 wrote to memory of 2788 2992 cmd.exe 46 PID 2992 wrote to memory of 2788 2992 cmd.exe 46 PID 2992 wrote to memory of 2788 2992 cmd.exe 46 PID 2816 wrote to memory of 2456 2816 msedge.exe 47 PID 2816 wrote to memory of 2456 2816 msedge.exe 47 PID 2816 wrote to memory of 2456 2816 msedge.exe 47 PID 2816 wrote to memory of 2700 2816 msedge.exe 49 PID 2816 wrote to memory of 2700 2816 msedge.exe 49 PID 2816 wrote to memory of 2700 2816 msedge.exe 49 PID 2816 wrote to memory of 2832 2816 msedge.exe 51 PID 2816 wrote to memory of 2832 2816 msedge.exe 51 PID 2816 wrote to memory of 2832 2816 msedge.exe 51 PID 2816 wrote to memory of 2336 2816 msedge.exe 53 PID 2816 wrote to memory of 2336 2816 msedge.exe 53 PID 2816 wrote to memory of 2336 2816 msedge.exe 53 PID 2816 wrote to memory of 2380 2816 msedge.exe 55 PID 2816 wrote to memory of 2380 2816 msedge.exe 55 PID 2816 wrote to memory of 2380 2816 msedge.exe 55 PID 1820 wrote to memory of 2128 1820 taskeng.exe 58 PID 1820 wrote to memory of 2128 1820 taskeng.exe 58 PID 1820 wrote to memory of 2128 1820 taskeng.exe 58 PID 1820 wrote to memory of 816 1820 taskeng.exe 59 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe"C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM EpicGamesLauncher.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\taskkill.exetaskkill /IM EpicGamesLauncher.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping_BE.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping_BE.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM x64dbg.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\taskkill.exetaskkill /IM x64dbg.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\msedge.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\msedge.exeC:\Windows\msedge.exe3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Msedge" /tr "C:\Users\Public\Msedge.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2380
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe" MD53⤵PID:2772
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2780
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2788
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9E205758-A1F9-4D45-9BE8-E2EE8F30CA88} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c39cc50d37e9cee6f159c4f58f382f2e
SHA1cfea204bdd090a2cc3f692d30d18106824cc8441
SHA25682e75cad3ccbdf47e3955b56f2f9bbe21b70b506aaac7117c44daf0d2bc5cdb3
SHA51257520456f4e81684d719a35bbd7f94bd8bacfe08efe192f111e8558cafe1fe29f2f8eea3223f268ddaa5eaae73bfc3f2e9d6689d7797c09faec482ce2734f080
-
Filesize
204KB
MD54738e3496a3efe5f19c57b764eb5ba9b
SHA1da9163944b1f51438b2602cbc95660af43172065
SHA256cb51764f19e66bb6accd7f0418332bac7759073ed245f0633dddd53f68e81933
SHA5124cb3029e136471edf2ebb46d1e4fc3a70e5138a5bd4b3fb182b6746d00c69fd5cf8822c0c90c2bcb4d8276db0cecac16ea0198e18a44e755a340495b19cc2238