Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 19:02

General

  • Target

    f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe

  • Size

    699KB

  • MD5

    c684a63e08404601807c7bd5af233d28

  • SHA1

    d9607463fcf1ce55eb8e5649b65047ee526d8060

  • SHA256

    f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621

  • SHA512

    ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd

  • SSDEEP

    12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLxwxhzZ:ffmMv6Ckr7Mny5QLxwxhV

Malware Config

Extracted

Family

xworm

Version

3.1

C2

69.174.99.6:7000

Mutex

ZMMi52bfIGvYY0Ok

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendMessage?chat_id=6236275763

Signatures

  • Detect Xworm Payload 3 IoCs
  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
    "C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\anaboly\starbowlines.exe
      "C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr
          "C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr" /S
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1288
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr" /S
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\apostrophise

    Filesize

    30KB

    MD5

    d15f30aadcae7f87307e63e039228866

    SHA1

    61d3595411a9a2ff483a5e1b5a359ca7868d1f5a

    SHA256

    25ae69f8d71da3dbcde420c9a0abf90bbce046c27969580b2a37e289ce9b6205

    SHA512

    25e6801408e24b6c5a2472ed7218ff9a7e272b2b1747a9c2a7eb7ed40223649589daac713c08fe8015df89b5d0da176188345edcfbd0ef56e3a4151b12467fa0

  • C:\Users\Admin\AppData\Local\Temp\furcation

    Filesize

    29KB

    MD5

    a2a9ce81977085a400789d49db0f0250

    SHA1

    3ebe1a79d42e3bda77030fa6b26740bd7a287691

    SHA256

    4a3071b8298eb6dbc10141a491909fa7c726d68bc5721581587b09797e16bc58

    SHA512

    0919addf21283224eb83353d7f7a3e8ff62047699ab97bb3ac57a0aafe51e397465ef1be30808ff20b6b5e8a12a5a2000dfa76db6557b3f258bfc7c1c59082dc

  • C:\Users\Admin\AppData\Local\Temp\furcation

    Filesize

    28KB

    MD5

    047bb03b304822bed7f32550438d63b4

    SHA1

    8c393608d386dc29c90337370a39843acf39d7ce

    SHA256

    87939add59166c199e246e8c761a0dfb8028f5f9b6e3f54895d9391c17f8dc17

    SHA512

    35ef5949244e89c0b1cc2f1d4d54cba66a5e1356c0d68d333cb9e399539d8d008f9aa1b3c9782b48b7adc5d1724b1a33622ed08c1adb3ed5a6486b97e679dc07

  • C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr

    Filesize

    785KB

    MD5

    8d46e55973af1de9d60320eab1ea1fa2

    SHA1

    2b6e1e250f5601308ab09a8a5f5ad78b78c33985

    SHA256

    86865a4fa894a64051e0bd9134851d148576c2fc3b49e0621fb04553bb5632f5

    SHA512

    b51f517918b9b98a6d1720a73f02401e47bc4e9459ae316fcfdaa9eac300dfe873b6d775fb01f53fbd5547352de265a52d95700dc5470d604b1b2bb23840f029

  • \Users\Admin\AppData\Local\anaboly\starbowlines.exe

    Filesize

    699KB

    MD5

    c684a63e08404601807c7bd5af233d28

    SHA1

    d9607463fcf1ce55eb8e5649b65047ee526d8060

    SHA256

    f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621

    SHA512

    ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd

  • memory/2648-10-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/2744-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-35-0x00000000740EE000-0x00000000740EF000-memory.dmp

    Filesize

    4KB

  • memory/2744-36-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2744-37-0x00000000740EE000-0x00000000740EF000-memory.dmp

    Filesize

    4KB

  • memory/2744-38-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2744-34-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2944-57-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2944-59-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2944-58-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB