Malware Analysis Report

2025-01-02 06:54

Sample ID 241129-a3t56awqcx
Target 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe
SHA256 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210
Tags
asyncrat venomrat vjw0rm xworm default execution persistence rat trojan worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210

Threat Level: Known bad

The file 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat venomrat vjw0rm xworm default execution persistence rat trojan worm

Vjw0rm

Vjw0rm family

Xworm family

VenomRAT

Asyncrat family

Detect Xworm Payload

Venomrat family

Xworm

AsyncRat

Async RAT payload

Blocklisted process makes network request

Checks computer location settings

Executes dropped EXE

Drops startup file

Adds Run key to start application

Enumerates physical storage devices

Command and Scripting Interpreter: JavaScript

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-29 00:44

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-29 00:44

Reported

2024-11-29 00:46

Platform

win7-20241010-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"

Signatures

AsyncRat

rat asyncrat

Asyncrat family

asyncrat

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

VenomRAT

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Venomrat family

venomrat

Vjw0rm

trojan worm vjw0rm

Vjw0rm family

vjw0rm

Xworm

trojan rat xworm

Xworm family

xworm

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js C:\Windows\System32\WScript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js C:\Windows\System32\WScript.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\KNNEIOX550 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\info.js\"" C:\Windows\System32\WScript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\windows" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Command and Scripting Interpreter: JavaScript

execution

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0wazE.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0wazE.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2568 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
PID 2568 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
PID 2568 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
PID 2568 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 2568 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 2568 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 1484 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Windows\System32\WScript.exe
PID 1484 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Windows\System32\WScript.exe
PID 1484 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Windows\System32\WScript.exe
PID 1484 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\Client.exe
PID 1484 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\Client.exe
PID 1484 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\Client.exe
PID 1484 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe
PID 1484 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe
PID 1484 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe
PID 1484 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 1484 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 1484 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe

Processes

C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe

"C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"

C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe

"C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe"

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\info.js"

C:\Users\Admin\AppData\Local\Temp\Client.exe

"C:\Users\Admin\AppData\Local\Temp\Client.exe"

C:\Users\Admin\AppData\Local\Temp\XClient.exe

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"

Network

Country Destination Domain Proto
NL 178.215.224.142:4449 tcp
US 8.8.8.8:53 vj1122.duckdns.org udp
NL 178.215.224.142:1122 vj1122.duckdns.org tcp
NL 178.215.224.142:4449 vj1122.duckdns.org tcp
US 8.8.8.8:53 rentry.co udp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 vj1122.duckdns.org tcp
NL 178.215.224.142:4449 vj1122.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:1122 vj1122.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 vj1122.duckdns.org tcp
US 8.8.8.8:53 xworm7000.duckdns.org udp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
US 8.8.8.8:53 xworm7000.duckdns.org udp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.3.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp

Files

memory/2568-0-0x000007FEF5103000-0x000007FEF5104000-memory.dmp

memory/2568-1-0x0000000000C10000-0x0000000000C72000-memory.dmp

memory/2568-4-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe

MD5 7beac06d9c9dc95b8dacd72d6ea87597
SHA1 ccc9ef68f1781a7c5d2c9cc4ac57198698ec418e
SHA256 be0986c1154533a6fa8ae0eb77c0f6c95ff5a153dd096b408888816f71fef835
SHA512 04ff58b844a687aadb5f4243ef5431619b02036abb29768d77ca309039adb1505ff62853be6bae4c238e55a9645a916912d85445147652ff0cd7b3d35e80798f

memory/1484-10-0x0000000000AF0000-0x0000000000BA2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

MD5 e264fe3d12c6e1a0f1d7e9ed2261e92d
SHA1 7a0e223c6ee4da81b80f49cbe6a602b2b354b1ab
SHA256 1a4bb157823139eff9b0bedce2a9452759ecc47801785743fb9667647347c4d5
SHA512 8a7ff7c1cf941aa10641650056f71da6974984c7383dade8683d7fd24e1ebd078da76dcc622238594fd53295205753c59364a64eaa67f3a2ea8734e679533209

memory/2568-15-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

memory/1484-14-0x00000000004F0000-0x0000000000536000-memory.dmp

memory/2128-16-0x0000000000AA0000-0x0000000000AC0000-memory.dmp

memory/1484-17-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Client.exe

MD5 0443ba1255e5419d79b3ed3382ec00ff
SHA1 f8dcda47375189f3164fc8419f84fa92674e4710
SHA256 9c238fa3c048bab6d3e72f171d2b3994ac1686477a4febdcb2fa7a8fa987c6f6
SHA512 d10064412a09576ffc9b5e2d22a0ca97a65f70f19e80c3494c2c9e422a36169e13ac72a9d948308d3aa3ccedb03998996611963de71eeca05a0607beaa199374

C:\Users\Admin\AppData\Local\Temp\XClient.exe

MD5 789f782e9e3170fdbc5f69ad90f1fd54
SHA1 3e679929bc157c5a3f590ad15a9218c99fc2c1d3
SHA256 563760d0e6a3933465fe1021323e33d82e16f91a7cd71abd3afae862af2ad338
SHA512 5336464c17e4aa31b488f56025da479763c9292bd5fb354512d02c937c577494303fd0fee325ef25333f96839889f51bfbf4db0f98b42a22ee30613d96baf152

C:\Users\Admin\AppData\Local\Temp\info.js

MD5 c9f85ebe8ae38f1bf04be9d4ebe82219
SHA1 c72eeed1d5814247196b0c9935f6fa86c010e4c6
SHA256 c0157ee7368a626b38657229ddd1e58d058e571fc83977c26a2f511c15197e37
SHA512 5ba0756ac069a4c1b5d6d1fe47a20916494bbbd076dbce05d7eae6f17330a350b00903e4f7ffdb8b98ad3aa96e7b66913bef3b0c4cfc43a8219aa93613948ae8

memory/2836-32-0x0000000000A80000-0x0000000000A90000-memory.dmp

memory/2764-33-0x0000000000A40000-0x0000000000A58000-memory.dmp

memory/1484-36-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-29 00:44

Reported

2024-11-29 00:46

Platform

win10v2004-20241007-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"

Signatures

AsyncRat

rat asyncrat

Asyncrat family

asyncrat

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

VenomRAT

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Venomrat family

venomrat

Vjw0rm

trojan worm vjw0rm

Vjw0rm family

vjw0rm

Xworm

trojan rat xworm

Xworm family

xworm

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js C:\Windows\System32\WScript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js C:\Windows\System32\WScript.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\windows" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KNNEIOX550 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\info.js\"" C:\Windows\System32\WScript.exe N/A

Command and Scripting Interpreter: JavaScript

execution

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0wazE.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0wazE.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3168 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
PID 3168 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
PID 3168 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 3168 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 880 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Windows\System32\WScript.exe
PID 880 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Windows\System32\WScript.exe
PID 880 wrote to memory of 3624 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\Client.exe
PID 880 wrote to memory of 3624 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\Client.exe
PID 880 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe
PID 880 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe
PID 880 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe
PID 880 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe C:\Users\Admin\AppData\Local\Temp\0wazE.exe

Processes

C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe

"C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"

C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe

"C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe"

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\info.js"

C:\Users\Admin\AppData\Local\Temp\Client.exe

"C:\Users\Admin\AppData\Local\Temp\Client.exe"

C:\Users\Admin\AppData\Local\Temp\XClient.exe

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 vj1122.duckdns.org udp
NL 178.215.224.142:1122 vj1122.duckdns.org tcp
NL 178.215.224.142:4449 vj1122.duckdns.org tcp
US 8.8.8.8:53 rentry.co udp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 vj1122.duckdns.org tcp
US 8.8.8.8:53 16.2.26.104.in-addr.arpa udp
US 8.8.8.8:53 xworm7000.duckdns.org udp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 8.8.8.8:53 xworm7000.duckdns.org udp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:1122 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:7000 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
NL 178.215.224.142:4449 xworm7000.duckdns.org tcp
US 104.26.2.16:443 rentry.co tcp
US 104.26.2.16:443 rentry.co tcp

Files

memory/3168-0-0x00007FFD9D8C3000-0x00007FFD9D8C5000-memory.dmp

memory/3168-1-0x0000000000C10000-0x0000000000C72000-memory.dmp

memory/3168-3-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe

MD5 7beac06d9c9dc95b8dacd72d6ea87597
SHA1 ccc9ef68f1781a7c5d2c9cc4ac57198698ec418e
SHA256 be0986c1154533a6fa8ae0eb77c0f6c95ff5a153dd096b408888816f71fef835
SHA512 04ff58b844a687aadb5f4243ef5431619b02036abb29768d77ca309039adb1505ff62853be6bae4c238e55a9645a916912d85445147652ff0cd7b3d35e80798f

C:\Users\Admin\AppData\Local\Temp\0wazE.exe

MD5 e264fe3d12c6e1a0f1d7e9ed2261e92d
SHA1 7a0e223c6ee4da81b80f49cbe6a602b2b354b1ab
SHA256 1a4bb157823139eff9b0bedce2a9452759ecc47801785743fb9667647347c4d5
SHA512 8a7ff7c1cf941aa10641650056f71da6974984c7383dade8683d7fd24e1ebd078da76dcc622238594fd53295205753c59364a64eaa67f3a2ea8734e679533209

memory/880-25-0x0000000000EE0000-0x0000000000F92000-memory.dmp

memory/880-27-0x0000000001750000-0x0000000001796000-memory.dmp

memory/2160-28-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp

memory/880-30-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp

memory/2160-31-0x0000000000180000-0x00000000001A0000-memory.dmp

memory/3168-29-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Client.exe

MD5 0443ba1255e5419d79b3ed3382ec00ff
SHA1 f8dcda47375189f3164fc8419f84fa92674e4710
SHA256 9c238fa3c048bab6d3e72f171d2b3994ac1686477a4febdcb2fa7a8fa987c6f6
SHA512 d10064412a09576ffc9b5e2d22a0ca97a65f70f19e80c3494c2c9e422a36169e13ac72a9d948308d3aa3ccedb03998996611963de71eeca05a0607beaa199374

C:\Users\Admin\AppData\Local\Temp\info.js

MD5 c9f85ebe8ae38f1bf04be9d4ebe82219
SHA1 c72eeed1d5814247196b0c9935f6fa86c010e4c6
SHA256 c0157ee7368a626b38657229ddd1e58d058e571fc83977c26a2f511c15197e37
SHA512 5ba0756ac069a4c1b5d6d1fe47a20916494bbbd076dbce05d7eae6f17330a350b00903e4f7ffdb8b98ad3aa96e7b66913bef3b0c4cfc43a8219aa93613948ae8

memory/3624-55-0x0000000000FB0000-0x0000000000FC8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\XClient.exe

MD5 789f782e9e3170fdbc5f69ad90f1fd54
SHA1 3e679929bc157c5a3f590ad15a9218c99fc2c1d3
SHA256 563760d0e6a3933465fe1021323e33d82e16f91a7cd71abd3afae862af2ad338
SHA512 5336464c17e4aa31b488f56025da479763c9292bd5fb354512d02c937c577494303fd0fee325ef25333f96839889f51bfbf4db0f98b42a22ee30613d96baf152

memory/2524-60-0x00000000008C0000-0x00000000008D0000-memory.dmp

memory/880-64-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp

memory/2160-66-0x00007FFD9D8C0000-0x00007FFD9E381000-memory.dmp