Analysis
-
max time kernel
33s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 21:30
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
72KB
-
MD5
8d52069bd117da94e0b0b70e73e33fb0
-
SHA1
e8090adddff167e1bda4194af968ba4bc22a2d60
-
SHA256
b3e217c467cfe1e8079e82b88f2f99950a9459330a8843070ebb34bf3e2bcf38
-
SHA512
7a91eeb0cf3edb53d0ac3d51abe85c97bb09da5b334b387fda90144a2f3729693367c451fee9e04cb953dcf8d9d1b91ee12961bfe9f1e53c0ab06aababd696ed
-
SSDEEP
1536:8C7dCCRXek2ycziKLGIp78eax9xbMxioyAgDd+E6V186Oc8E2el:p7MKOHXBGVpxbIEAgRA1dOcYel
Malware Config
Extracted
xworm
87.120.112.33:8398
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2116-1-0x0000000000260000-0x0000000000278000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1652 powershell.exe 2576 powershell.exe 2848 powershell.exe 1656 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk file.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2116 file.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1652 powershell.exe 2576 powershell.exe 2848 powershell.exe 1656 powershell.exe 2116 file.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2116 file.exe Token: SeDebugPrivilege 1652 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 2116 file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 file.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1652 2116 file.exe 30 PID 2116 wrote to memory of 1652 2116 file.exe 30 PID 2116 wrote to memory of 1652 2116 file.exe 30 PID 2116 wrote to memory of 2576 2116 file.exe 32 PID 2116 wrote to memory of 2576 2116 file.exe 32 PID 2116 wrote to memory of 2576 2116 file.exe 32 PID 2116 wrote to memory of 2848 2116 file.exe 34 PID 2116 wrote to memory of 2848 2116 file.exe 34 PID 2116 wrote to memory of 2848 2116 file.exe 34 PID 2116 wrote to memory of 1656 2116 file.exe 36 PID 2116 wrote to memory of 1656 2116 file.exe 36 PID 2116 wrote to memory of 1656 2116 file.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\file.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55f4c3cb997adf40d00ff16493ba9d74f
SHA149845f54e27e2be2c4826fcb3041ba4b247c4693
SHA256ac05ecf1f7075703f4156c092fa87f47cff2a3e1dcc4903fdd66faa3dc8c7c29
SHA512a030001930c14f5c7409efb10da215fc68698e556c6e0fb41c5e1b25854e9b24a3eb63f3a3f45106a01e4d114aab25db1157f44f60d6119fe1e8cbad333bf6e2