Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:57

General

  • Target

    b15e57df1ab1fc902337d52f633267b802ccee6f37ba21ca065ae14380817081.exe

  • Size

    177KB

  • MD5

    ba88dca6e9d0a6f55a8addc30b02d988

  • SHA1

    f48b8d8255a9192675dde74ef7db412fcb528792

  • SHA256

    b15e57df1ab1fc902337d52f633267b802ccee6f37ba21ca065ae14380817081

  • SHA512

    f10c077bb1aa2c0c32ce0dc03a0b3e27f838b98c1251d7540d2d81e7c3b13ee45cfcb79be085ea83dd12ee9eb0613a1fc116f9283236379fdf85320199a6e2c3

  • SSDEEP

    3072:jvXdvpzRm9npGJyJObSGOOs3KI/ZMQRoGaHn2J:jvXdvpzRmzm/bSGOOs3KI/GQI

Malware Config

Extracted

Family

xworm

Version

5.0

C2

nwamama.ydns.eu:3791

Mutex

bUIwrJMMMqrauUWR

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\b15e57df1ab1fc902337d52f633267b802ccee6f37ba21ca065ae14380817081.exe
        "C:\Users\Admin\AppData\Local\Temp\b15e57df1ab1fc902337d52f633267b802ccee6f37ba21ca065ae14380817081.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2884
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 1808
          3⤵
          • Program crash
          PID:3120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5096 -ip 5096
      1⤵
        PID:4900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2884-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

        Filesize

        4KB

      • memory/2884-1-0x0000000000770000-0x00000000007A2000-memory.dmp

        Filesize

        200KB

      • memory/2884-2-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/2884-3-0x00000000062E0000-0x00000000063CA000-memory.dmp

        Filesize

        936KB

      • memory/2884-4-0x00000000069A0000-0x0000000006F44000-memory.dmp

        Filesize

        5.6MB

      • memory/2884-5-0x00000000064F0000-0x0000000006582000-memory.dmp

        Filesize

        584KB

      • memory/2884-51-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-49-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-69-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-67-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-65-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-63-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-61-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-59-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-57-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-55-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-53-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-47-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-45-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-43-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-42-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-39-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-37-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-35-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-33-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-31-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-29-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-27-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-25-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-23-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-21-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-17-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-15-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-13-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-11-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-9-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-6-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-19-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-7-0x00000000062E0000-0x00000000063C5000-memory.dmp

        Filesize

        916KB

      • memory/2884-1156-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/2884-1157-0x0000000006600000-0x000000000665A000-memory.dmp

        Filesize

        360KB

      • memory/2884-1158-0x0000000006660000-0x00000000066AC000-memory.dmp

        Filesize

        304KB

      • memory/2884-1159-0x00000000066D0000-0x0000000006724000-memory.dmp

        Filesize

        336KB

      • memory/2884-1164-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/2884-1169-0x00000000747CE000-0x00000000747CF000-memory.dmp

        Filesize

        4KB

      • memory/2884-1171-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/2884-1168-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/2884-1167-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/5096-1172-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/5096-1173-0x0000000000400000-0x0000000000410000-memory.dmp

        Filesize

        64KB

      • memory/5096-1174-0x0000000005590000-0x000000000562C000-memory.dmp

        Filesize

        624KB

      • memory/5096-1175-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/5096-1176-0x0000000006660000-0x000000000666A000-memory.dmp

        Filesize

        40KB

      • memory/5096-1177-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/5096-1178-0x00000000066E0000-0x0000000006746000-memory.dmp

        Filesize

        408KB

      • memory/5096-1179-0x0000000006A50000-0x0000000006B70000-memory.dmp

        Filesize

        1.1MB

      • memory/5096-1180-0x00000000070B0000-0x0000000007404000-memory.dmp

        Filesize

        3.3MB

      • memory/5096-1181-0x0000000006C80000-0x0000000006CCC000-memory.dmp

        Filesize

        304KB

      • memory/5096-1220-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB