Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 16:49
Behavioral task
behavioral1
Sample
be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe
Resource
win10v2004-20241007-en
General
-
Target
be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe
-
Size
77KB
-
MD5
5e8a5156dbc7d49253c816d51b6db041
-
SHA1
0af49260496487b42325309b0748ed9657649d03
-
SHA256
be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d
-
SHA512
96d70896c34ca88e9cdf315c93bb2fb10195f663331e2f74ded08bf3aff5c7ba176bda8aa5193f62aa251fa262d59c8e70a7de4b1d97ac130c5a6461278901cc
-
SSDEEP
1536:x5sFO8g/9VM5dQ+aomobhr3KXg6wzOB1SmOnU7Ua+GD:x5sU9Vv4bbhr6SOB1S5nU7MGD
Malware Config
Extracted
xworm
left-noon.gl.at.ply.gg:60705
-
Install_directory
%AppData%
-
install_file
US11B.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2764-1-0x0000000000320000-0x000000000033A000-memory.dmp family_xworm behavioral1/files/0x00150000000054a9-30.dat family_xworm behavioral1/memory/1912-36-0x0000000001180000-0x000000000119A000-memory.dmp family_xworm behavioral1/memory/1112-39-0x00000000011E0000-0x00000000011FA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1680 powershell.exe 3064 powershell.exe 1572 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.lnk be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.lnk be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Executes dropped EXE 2 IoCs
pid Process 1912 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 1112 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d = "C:\\Users\\Admin\\AppData\\Roaming\\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe" be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1680 powershell.exe 3064 powershell.exe 1572 powershell.exe 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe Token: SeDebugPrivilege 1912 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe Token: SeDebugPrivilege 1112 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1680 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 31 PID 2764 wrote to memory of 1680 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 31 PID 2764 wrote to memory of 1680 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 31 PID 2764 wrote to memory of 3064 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 33 PID 2764 wrote to memory of 3064 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 33 PID 2764 wrote to memory of 3064 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 33 PID 2764 wrote to memory of 1572 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 35 PID 2764 wrote to memory of 1572 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 35 PID 2764 wrote to memory of 1572 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 35 PID 2764 wrote to memory of 2500 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 37 PID 2764 wrote to memory of 2500 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 37 PID 2764 wrote to memory of 2500 2764 be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe 37 PID 1564 wrote to memory of 1912 1564 taskeng.exe 41 PID 1564 wrote to memory of 1912 1564 taskeng.exe 41 PID 1564 wrote to memory of 1912 1564 taskeng.exe 41 PID 1564 wrote to memory of 1112 1564 taskeng.exe 42 PID 1564 wrote to memory of 1112 1564 taskeng.exe 42 PID 1564 wrote to memory of 1112 1564 taskeng.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe"C:\Users\Admin\AppData\Local\Temp\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d" /tr "C:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F295CAF5-4F5E-43AE-8CD6-581F7EA99B45} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exeC:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exeC:\Users\Admin\AppData\Roaming\be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD544ec295a2f434595aa90defce2e2f15b
SHA19244fde0263fab555c881f1e527fcb77ba81a841
SHA256279135b45c748034ee84753e5891bbed27d0d7206fe612cd094711d846cbbf65
SHA5120ea61ee8920f8c3e7b888d0903b3f5e9397fbb6d589d718d54268767d22fa85ce24652749438a9b7c68e8a3f4239debd418e6eb9b0b9bc83a87a3524659e58f6
-
Filesize
77KB
MD55e8a5156dbc7d49253c816d51b6db041
SHA10af49260496487b42325309b0748ed9657649d03
SHA256be3bbb60ddff2195d79756f8bc744a8e6e3fb630c6aad02cff85a4cc681e4a6d
SHA51296d70896c34ca88e9cdf315c93bb2fb10195f663331e2f74ded08bf3aff5c7ba176bda8aa5193f62aa251fa262d59c8e70a7de4b1d97ac130c5a6461278901cc