Resubmissions

18-11-2024 09:56

241118-lybc2atndv 10

18-11-2024 09:53

241118-lw2r7sypfn 10

Analysis

  • max time kernel
    362s
  • max time network
    364s
  • platform
    windows7_x64
  • resource
    win7-20240903-ja
  • resource tags

    arch:x64arch:x86image:win7-20240903-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    18-11-2024 09:56

General

  • Target

    Admin Tools.rar.exe

  • Size

    11.8MB

  • MD5

    ddcffb7143bb8073f53391fd44159950

  • SHA1

    e55cfccc6eefd6c8079f6e18459a3eb509107bd2

  • SHA256

    ddfe0cfb0d6ff02a67de60e59a1f212403d075eb1afebccb7e21e094d463a33a

  • SHA512

    1538f3ee18787485e727904eeac50ea6dbf207ff5aa61620223a33aa5c7c743d17c1ab9c499f04cb6e3954c28434f0dd01ef94412e2a62a94e77d9f996a8db27

  • SSDEEP

    196608:lQXFWvrR+RBZuLVESPp94EMtwBVxCS8ns71EWradV3qAo5QiPZbdBD8h5sf0IfvB:l/URsVz2Z6BVxGmbeV3qc35sfFRf

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

FDifYDumKCtsXZEN

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 14 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Admin Tools.rar.exe
    "C:\Users\Admin\AppData\Local\Temp\Admin Tools.rar.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Admin Tools.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Admin Tools.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\Admin Tools.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2928
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1644
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2856
    • C:\Users\Admin\AppData\Local\Temp\Admin Tools.rar.exe
      "C:\Users\Admin\AppData\Local\Temp\Admin Tools.rar.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\Admin Tools.rar"
        2⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1912
      • C:\Users\Admin\AppData\Roaming\XClient.exe
        "C:\Users\Admin\AppData\Roaming\XClient.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Admin Tools.rar.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1760
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\.rsrc\version.txt
      1⤵
        PID:1748
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\.text
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1060
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\.text
          2⤵
            PID:2268
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0
          1⤵
            PID:1600

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Admin Tools.rar

            Filesize

            11.8MB

            MD5

            e1ea29674dd974b512bcbce795125c36

            SHA1

            692eb95e5ebd143e52469de9881468c84cfa716a

            SHA256

            42160df9a104bb4a287477af00672753be7bdec93badce0c766fafd88da0af3f

            SHA512

            a3659c3d6021f86af1cf8c4f35247e71c30cc5944c5029477636da6f384233b9d6babc82bf3fa92ae3374d91a0fe71be9b84fbf69fdfc2138e621e3d839de0a9

          • C:\Users\Admin\AppData\Roaming\XClient.exe

            Filesize

            32KB

            MD5

            c8adc1201433e732c762f4cca0ef59d5

            SHA1

            0ef49322427eee1735d2cd943d645453edbbc173

            SHA256

            0a66ae70b388aaa6ca8228d829345728739b631586440672faf0f9dd894cb994

            SHA512

            8f5d476a637da21a37f6b160b7a6281bc2aa952905ef06a61aa8b2851c5edf67b1528a7c46b6295856751b79de079aa05aea371cb7211074adcd97b3e537295e

          • C:\Users\Admin\AppData\Roaming\vlc\ml.xspf

            Filesize

            318B

            MD5

            5d7eb36c9e1a90c6140370dc8fe78ed3

            SHA1

            03c327ba02e605d213f324aa34545e8232d96e38

            SHA256

            63eba58c10f38220de2e5a13d6c2e57fafdb256ebf771c1f8946055e2451321a

            SHA512

            e2d433e115455f049aff6fe23aad3301dc07a17048ddb9ae3438297fa2647ca8b9fbcdb870f3d62c2f0a7a4d2ac538622defc680cecfd3072f01b72bf236aee0

          • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

            Filesize

            541B

            MD5

            c6f12302ebc7ca470a91e16bf042f29a

            SHA1

            96062d76717abd25f1c8a53ce08c14537689bf11

            SHA256

            f523a46db177fcc48101352ac3770952a55ac4cd7fcdb361bcdc5094a9bdddf1

            SHA512

            665c90c1da9ed545a82af89c50fe58ee21428c95badb9c3342cb15de67895f3ddb8e796acc62f31e2495b54dd123f32b0cedd2ee08d006726a05f293ede3efca

          • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

            Filesize

            541B

            MD5

            43a8a93dd8f1941ab1b3f736a563d5a0

            SHA1

            776597f3a734823e8bcc6ac92e7e3ec15676655b

            SHA256

            99a50584603c94cac2b3e30468fac8abb49907201d6ba8b2096fc727cec15b42

            SHA512

            13a0f1ce77068dda6bb04715e8c464e2044a2bba150b37c18cc628119f3153b144f4ffd9eceb0649269c03e4598bf3b9ca2d21d03e200e80c0704cacaa0c2d40

          • C:\Users\Admin\Desktop\.rsrc\version.txt

            Filesize

            1KB

            MD5

            bb49ef0665e62d9901746790ef02406d

            SHA1

            954eb6c74ad503189ce491eb50c8bc0a91eee07d

            SHA256

            57c438c7c4016ef610c671bed6696584994cc530a6082181f3e491fe8f822694

            SHA512

            575d5ad8c1b6aa9145c7bf9344f02731708b1df8ef32009179b27a8defbd2d25d3e677bcd43215bd8607c25c7fa19e64d68c954b9709a8c74cc5e7e85a1266f2

          • C:\Users\Admin\Desktop\.text

            Filesize

            11.8MB

            MD5

            9d7b7425cec8591729bbc92efdfdcbcb

            SHA1

            d5a7443433f857c59b669c9a4f7204ac8f7ea2ff

            SHA256

            d1b8143cbbc91cacb551916bb01426c13d0ffcc1dfda2426bbb0bb1828d6db25

            SHA512

            be8ac39468bb047ba203eaa0778a6b253fea5f9bb3a695e16e2d4db96531deb7c8157cf708b34ea5d9a932baf1ac6bc5f50f2dfc3b5b16511ad9b00d6ceae3ca

          • memory/2168-1111-0x00000000011E0000-0x0000000001DBC000-memory.dmp

            Filesize

            11.9MB

          • memory/2628-0-0x000007FEF4F13000-0x000007FEF4F14000-memory.dmp

            Filesize

            4KB

          • memory/2628-1-0x0000000000E30000-0x0000000001A0C000-memory.dmp

            Filesize

            11.9MB

          • memory/2748-8-0x0000000000140000-0x000000000014E000-memory.dmp

            Filesize

            56KB

          • memory/2928-33-0x000007FEF6BC0000-0x000007FEF6BDB000-memory.dmp

            Filesize

            108KB

          • memory/2928-40-0x000007FEF21F0000-0x000007FEF2247000-memory.dmp

            Filesize

            348KB

          • memory/2928-24-0x000007FEF7800000-0x000007FEF7811000-memory.dmp

            Filesize

            68KB

          • memory/2928-17-0x000007FEF5FE0000-0x000007FEF6296000-memory.dmp

            Filesize

            2.7MB

          • memory/2928-25-0x000007FEF5CA0000-0x000007FEF5EAB000-memory.dmp

            Filesize

            2.0MB

          • memory/2928-28-0x000007FEF77D0000-0x000007FEF77F1000-memory.dmp

            Filesize

            132KB

          • memory/2928-27-0x000007FEF6C40000-0x000007FEF6C81000-memory.dmp

            Filesize

            260KB

          • memory/2928-31-0x000007FEF6C00000-0x000007FEF6C11000-memory.dmp

            Filesize

            68KB

          • memory/2928-32-0x000007FEF6BE0000-0x000007FEF6BF1000-memory.dmp

            Filesize

            68KB

          • memory/2928-30-0x000007FEF6C20000-0x000007FEF6C31000-memory.dmp

            Filesize

            68KB

          • memory/2928-29-0x000007FEF7560000-0x000007FEF7578000-memory.dmp

            Filesize

            96KB

          • memory/2928-23-0x000007FEF7820000-0x000007FEF783D000-memory.dmp

            Filesize

            116KB

          • memory/2928-34-0x000007FEF6BA0000-0x000007FEF6BB1000-memory.dmp

            Filesize

            68KB

          • memory/2928-35-0x000007FEF6370000-0x000007FEF6388000-memory.dmp

            Filesize

            96KB

          • memory/2928-38-0x000007FEF5C20000-0x000007FEF5C9C000-memory.dmp

            Filesize

            496KB

          • memory/2928-37-0x000007FEF5BA0000-0x000007FEF5C07000-memory.dmp

            Filesize

            412KB

          • memory/2928-36-0x000007FEF6340000-0x000007FEF6370000-memory.dmp

            Filesize

            192KB

          • memory/2928-22-0x000007FEF7840000-0x000007FEF7851000-memory.dmp

            Filesize

            68KB

          • memory/2928-39-0x000007FEF6320000-0x000007FEF6331000-memory.dmp

            Filesize

            68KB

          • memory/2928-47-0x000007FEF1B20000-0x000007FEF1B41000-memory.dmp

            Filesize

            132KB

          • memory/2928-50-0x000007FEEC5A0000-0x000007FEEC5B1000-memory.dmp

            Filesize

            68KB

          • memory/2928-49-0x000007FEEC5C0000-0x000007FEEC5D7000-memory.dmp

            Filesize

            92KB

          • memory/2928-48-0x000007FEF1B00000-0x000007FEF1B13000-memory.dmp

            Filesize

            76KB

          • memory/2928-46-0x000007FEF1D80000-0x000007FEF1D92000-memory.dmp

            Filesize

            72KB

          • memory/2928-45-0x000007FEF21A0000-0x000007FEF21B1000-memory.dmp

            Filesize

            68KB

          • memory/2928-44-0x000007FEF21C0000-0x000007FEF21E3000-memory.dmp

            Filesize

            140KB

          • memory/2928-43-0x000007FEF5930000-0x000007FEF5948000-memory.dmp

            Filesize

            96KB

          • memory/2928-42-0x000007FEF5950000-0x000007FEF5974000-memory.dmp

            Filesize

            144KB

          • memory/2928-41-0x000007FEF62F0000-0x000007FEF6318000-memory.dmp

            Filesize

            160KB

          • memory/2928-26-0x000007FEED030000-0x000007FEEE0E0000-memory.dmp

            Filesize

            16.7MB

          • memory/2928-21-0x000007FEF7860000-0x000007FEF7877000-memory.dmp

            Filesize

            92KB

          • memory/2928-20-0x000007FEFAC90000-0x000007FEFACA1000-memory.dmp

            Filesize

            68KB

          • memory/2928-19-0x000007FEFAF30000-0x000007FEFAF47000-memory.dmp

            Filesize

            92KB

          • memory/2928-18-0x000007FEFB0A0000-0x000007FEFB0B8000-memory.dmp

            Filesize

            96KB

          • memory/2928-15-0x000000013FE80000-0x000000013FF78000-memory.dmp

            Filesize

            992KB

          • memory/2928-16-0x000007FEFAF50000-0x000007FEFAF84000-memory.dmp

            Filesize

            208KB