Overview
overview
10Static
static
3fudcrypto.zip
windows7-x64
10fudcrypto.zip
windows10-2004-x64
10fud crypto...AX.dll
windows7-x64
7fud crypto...AX.dll
windows10-2004-x64
7fud crypto...en.dll
windows7-x64
1fud crypto...en.dll
windows10-2004-x64
1fud crypto...sg.dll
windows7-x64
1fud crypto...sg.dll
windows10-2004-x64
1fud crypto...st.man
windows7-x64
3fud crypto...st.man
windows10-2004-x64
3fud crypto...ts.xml
windows7-x64
3fud crypto...ts.xml
windows10-2004-x64
1fud crypto...to.exe
windows7-x64
10fud crypto...to.exe
windows10-2004-x64
10Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
fudcrypto.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fudcrypto.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
fud crypto/AUTHZAX.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
fud crypto/AUTHZAX.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
fud crypto/BCSAutogen.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
fud crypto/BCSAutogen.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
fud crypto/BCSClient.Msg.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
fud crypto/BCSClient.Msg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
fud crypto/BCSClientManifest.man
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
fud crypto/BCSClientManifest.man
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
fud crypto/BCSEvents.xml
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
fud crypto/BCSEvents.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
fud crypto/fudcrypto.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
fud crypto/fudcrypto.exe
Resource
win10v2004-20241007-en
General
-
Target
fudcrypto.zip
-
Size
212KB
-
MD5
8989cf7b833dc53bafc8ec626c3c13d8
-
SHA1
f5bbc5d9eb758a286de576bfb7b08e79d0bd7acb
-
SHA256
d074441c881b5ba2b3f238a730edbb942b0dfb97114e1a06ebd4872282a654ef
-
SHA512
7b373981cf06727207b8177aced9f989270a94635737cc6dbc27c041a3db5559df17987342bcc3d1d3ae8e2770065e27d9eb2c2eb3f92b30f8890a933b03da1e
-
SSDEEP
6144:B7/IelIkZgzD3ysBmPXjifL7JPkVu0iGty:S6LgzD3oXk7FYJty
Malware Config
Extracted
xworm
5.0
104.234.114.133:1188
cbhMMjEG3bxpp43T
-
Install_directory
%Temp%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c9d-21.dat family_xworm behavioral2/memory/2564-22-0x0000000000190000-0x000000000019E000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 4288 fudcrypto.exe 2564 595.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe" 595.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1544 7zFM.exe Token: 35 1544 7zFM.exe Token: SeSecurityPrivilege 1544 7zFM.exe Token: SeDebugPrivilege 2564 595.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1544 7zFM.exe 1544 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4288 wrote to memory of 2564 4288 fudcrypto.exe 108 PID 4288 wrote to memory of 2564 4288 fudcrypto.exe 108
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\fudcrypto.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4368
-
C:\Users\Admin\Desktop\fud crypto\fudcrypto.exe"C:\Users\Admin\Desktop\fud crypto\fudcrypto.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\595.exeC:\Users\Admin\AppData\Local\Temp\595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bc59447ed6636ac09fbf5faa235e0d67
SHA16bc2eda63514866023bf55330153267fc764c88a
SHA256bec57b2da35fec182afc1eeaf45132aac46da538ea746c7f2c41fd3369677b49
SHA5129baa8e9a7c59bec41b6a7fa035644fe95a33fa694cc77ecb272de7c532ede869d0ec7c987c1ad35cc2f4dde92dd22d9edb65ccce0e471334768be305b0a11d1e
-
Filesize
212KB
MD5eea17ac368bc01f9f8a3e0103cf5b6e6
SHA1d4df74f888d9025497c9e4b418c65cfa2c0ab2c0
SHA256de1d872fa35b4ec1a843db9c63fc7e4590fd3b7b250ab5c6a492630ab68b5886
SHA512cf297ea8ec540354a22fd046d34f6fc93e74bfe474e4729531263180e4cb35af48c0b6614f5a88c72f0bf767890109eba13c8eca3c9f1f6abaffe7cacabaaccf