Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 11:53

General

  • Target

    3668c5ce7620f92e5f39cea22c67bb89132718ad3799582ea326df60882572f3.exe

  • Size

    2.4MB

  • MD5

    7ab47cbee028ace83cac84f0f5cde714

  • SHA1

    b84f3f5aa68209f2a73acc2377727b8e481f3287

  • SHA256

    3668c5ce7620f92e5f39cea22c67bb89132718ad3799582ea326df60882572f3

  • SHA512

    a4d09b2401b779bf352413f341ae9a982b3914192cc7f377a5943be827b43797e4825919fe6d7230364c26db25ccf96f205daddb5cbab12ba623f56afbd42ee9

  • SSDEEP

    49152:+2uqU+xRoatgQBJKweR4RF8gAGBJ7dj9Shv68pd3hm/F4OGP6J:+2uOxRoaOQBEws4gWrhcoq3HOzJ

Score
10/10

Malware Config

Extracted

Family

xworm

C2

93.123.109.89:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    ApplicationFrameHost.exe

  • telegram

    https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3668c5ce7620f92e5f39cea22c67bb89132718ad3799582ea326df60882572f3.exe
    "C:\Users\Admin\AppData\Local\Temp\3668c5ce7620f92e5f39cea22c67bb89132718ad3799582ea326df60882572f3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\Ocean.exe
      "C:\Users\Admin\AppData\Local\Temp\Ocean.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4804
    • C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe
      "C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ApplicationFrameHost" /tr "C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1424
  • C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe
    C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2332
  • C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe
    C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ApplicationFrameHost.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Temp\ApplicationFrameHost.exe

    Filesize

    73KB

    MD5

    59304b625ddc6fa1d95bc09cf84b2fa6

    SHA1

    e3e14f54a6471570c3e10cc257fa8bedd5492d49

    SHA256

    440e5bf83310276bef2e72668283fda8eb1e84bdf902632fe0571bfe1ba61204

    SHA512

    0309e04719424ad52b9bf07c8801ace891b8ffdc1c1f69bae7269086ef296f576bd89d9b1a70b62d4545d83b952439b12de5b17d6e51a187068dd222414ec167

  • C:\Users\Admin\AppData\Local\Temp\Ocean.exe

    Filesize

    2.3MB

    MD5

    286efca498147dedaf4169e9bb297b52

    SHA1

    a88b65dc85d209a26da56c1d31fc63edb99d0819

    SHA256

    de824109d13ae96a87c2cfabbc650e05765e1ae36ebe69c4bf16d253f3e7f53d

    SHA512

    3b4149969308e53bf4f37af4f71d47199f6ba0198fd6e9b0a937daf11c728bdf2f695aa2400c1ee0db7708ed5e48b1cce5596b7a5cce9cafa21e6de8eb5c9ad6

  • memory/1508-22-0x0000000000CA0000-0x0000000000CB8000-memory.dmp

    Filesize

    96KB

  • memory/1508-23-0x00007FF9DC8D0000-0x00007FF9DD391000-memory.dmp

    Filesize

    10.8MB

  • memory/1508-24-0x00007FF9DC8D0000-0x00007FF9DD391000-memory.dmp

    Filesize

    10.8MB

  • memory/3776-0-0x00007FF9DC8D3000-0x00007FF9DC8D5000-memory.dmp

    Filesize

    8KB

  • memory/3776-1-0x0000000000520000-0x0000000000792000-memory.dmp

    Filesize

    2.4MB