Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 16:36
Behavioral task
behavioral1
Sample
xdblake.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
xdblake.exe
Resource
win10v2004-20241007-en
General
-
Target
xdblake.exe
-
Size
66KB
-
MD5
bca20b0a6a3877b3bbedd6595e804164
-
SHA1
0bfd19a1dac3f937098aa005ff0b5aab2e767663
-
SHA256
0f06d9dfb9badfd337bd1dfb21f8b0ebb934e81072cddcef3d8466e526f2275b
-
SHA512
4932b511e0429f3a97b726483a87641d579a0d0d8f61c2771eb900baaffe36ea9ee2fba4e098fd922dc3c2aab8b0684483096ed9eb0de23cdc97f63ac449ac32
-
SSDEEP
1536:aefDEXUBdPPSuPr+hBcbDVnjXVQ6eK4ORonSLIF:aextSuPr4BcbpjFIK4O6nSsF
Malware Config
Extracted
xworm
yet-assist.gl.at.ply.gg:63100
-
Install_directory
%ProgramData%
-
install_file
$77wsappx.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2636-1-0x0000000000BB0000-0x0000000000BC6000-memory.dmp family_xworm behavioral1/files/0x000a000000018718-36.dat family_xworm behavioral1/memory/592-38-0x0000000001340000-0x0000000001356000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2980 powershell.exe 2860 powershell.exe 1904 powershell.exe 2488 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77wsappx.lnk xdblake.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77wsappx.lnk xdblake.exe -
Executes dropped EXE 3 IoCs
pid Process 592 $77wsappx.exe 1004 $77wsappx.exe 2964 $77wsappx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\$77wsappx = "C:\\ProgramData\\$77wsappx.exe" xdblake.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1008 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2636 xdblake.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2980 powershell.exe 2860 powershell.exe 1904 powershell.exe 2488 powershell.exe 2636 xdblake.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2636 xdblake.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 2636 xdblake.exe Token: SeDebugPrivilege 592 $77wsappx.exe Token: SeDebugPrivilege 1004 $77wsappx.exe Token: SeDebugPrivilege 2964 $77wsappx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 xdblake.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2980 2636 xdblake.exe 32 PID 2636 wrote to memory of 2980 2636 xdblake.exe 32 PID 2636 wrote to memory of 2980 2636 xdblake.exe 32 PID 2636 wrote to memory of 2860 2636 xdblake.exe 34 PID 2636 wrote to memory of 2860 2636 xdblake.exe 34 PID 2636 wrote to memory of 2860 2636 xdblake.exe 34 PID 2636 wrote to memory of 1904 2636 xdblake.exe 36 PID 2636 wrote to memory of 1904 2636 xdblake.exe 36 PID 2636 wrote to memory of 1904 2636 xdblake.exe 36 PID 2636 wrote to memory of 2488 2636 xdblake.exe 38 PID 2636 wrote to memory of 2488 2636 xdblake.exe 38 PID 2636 wrote to memory of 2488 2636 xdblake.exe 38 PID 2636 wrote to memory of 1008 2636 xdblake.exe 40 PID 2636 wrote to memory of 1008 2636 xdblake.exe 40 PID 2636 wrote to memory of 1008 2636 xdblake.exe 40 PID 1864 wrote to memory of 592 1864 taskeng.exe 43 PID 1864 wrote to memory of 592 1864 taskeng.exe 43 PID 1864 wrote to memory of 592 1864 taskeng.exe 43 PID 1864 wrote to memory of 1004 1864 taskeng.exe 44 PID 1864 wrote to memory of 1004 1864 taskeng.exe 44 PID 1864 wrote to memory of 1004 1864 taskeng.exe 44 PID 1864 wrote to memory of 2964 1864 taskeng.exe 45 PID 1864 wrote to memory of 2964 1864 taskeng.exe 45 PID 1864 wrote to memory of 2964 1864 taskeng.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\xdblake.exe"C:\Users\Admin\AppData\Local\Temp\xdblake.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\xdblake.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'xdblake.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\$77wsappx.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77wsappx.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77wsappx" /tr "C:\ProgramData\$77wsappx.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1008
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C2540C96-4FFF-42A2-B4E3-A0FB8EE2BD67} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\ProgramData\$77wsappx.exeC:\ProgramData\$77wsappx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\ProgramData\$77wsappx.exeC:\ProgramData\$77wsappx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\ProgramData\$77wsappx.exeC:\ProgramData\$77wsappx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5bca20b0a6a3877b3bbedd6595e804164
SHA10bfd19a1dac3f937098aa005ff0b5aab2e767663
SHA2560f06d9dfb9badfd337bd1dfb21f8b0ebb934e81072cddcef3d8466e526f2275b
SHA5124932b511e0429f3a97b726483a87641d579a0d0d8f61c2771eb900baaffe36ea9ee2fba4e098fd922dc3c2aab8b0684483096ed9eb0de23cdc97f63ac449ac32
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58ceb0c79600cbcb7a7d75e65e32b1396
SHA11fe1abe4cfb2eb21bba1883ce8f6f315bfc6bc24
SHA256dfcba4d265908f01a96d32e6393ffc7f1eff111425fea448f9409da8a8f4ab97
SHA512409fd71d521ad9cb977ed02d4fc85bec753c6bf0cec1dd61201df06960c0ed7bf3022b6c2fe75cba5dbb21ec6a2a129910da8f9123d1c0cd4d83876b5a7e087c