Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
378b2b52314f041dfd56b7f5074fe315
-
SHA1
450d844565c9917e0ebde24c702b3d84d021fe6f
-
SHA256
fc7d4533df74ba71d5ffe89d29601a3f0fcc4ae3388e61fdb7e3b15f4a7c9715
-
SHA512
3e3998db5f018add5dbd999125be2e06d2b2760d556a917b1a89cf3afce592b618e636b9381447244e9834bfe3d469d734c07d2d727755c5b828899deed85506
-
SSDEEP
49152:54dI4az0DW2O/fdDA95vPu0L5tY9S8xLGtznIqtrjHr:WI4a4Sndu5HtY9HLGB/rjHr
Malware Config
Extracted
xworm
5.0
36.50.233.24:60007
NXFxonThLtVC9fUS
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/728-26-0x0000000002BD0000-0x0000000002CD0000-memory.dmp family_xworm behavioral2/memory/728-27-0x0000000002DE0000-0x0000000002DEE000-memory.dmp family_xworm behavioral2/memory/728-30-0x0000000002BD0000-0x0000000002CD0000-memory.dmp family_xworm -
Xworm family
-
Loads dropped DLL 3 IoCs
pid Process 728 regsvr32.exe 1724 regsvr32.EXE 4368 regsvr32.EXE -
pid Process 3840 powershell.exe 3840 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3840 powershell.exe 3840 powershell.exe 728 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3840 powershell.exe Token: SeIncreaseQuotaPrivilege 3840 powershell.exe Token: SeSecurityPrivilege 3840 powershell.exe Token: SeTakeOwnershipPrivilege 3840 powershell.exe Token: SeLoadDriverPrivilege 3840 powershell.exe Token: SeSystemProfilePrivilege 3840 powershell.exe Token: SeSystemtimePrivilege 3840 powershell.exe Token: SeProfSingleProcessPrivilege 3840 powershell.exe Token: SeIncBasePriorityPrivilege 3840 powershell.exe Token: SeCreatePagefilePrivilege 3840 powershell.exe Token: SeBackupPrivilege 3840 powershell.exe Token: SeRestorePrivilege 3840 powershell.exe Token: SeShutdownPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeSystemEnvironmentPrivilege 3840 powershell.exe Token: SeRemoteShutdownPrivilege 3840 powershell.exe Token: SeUndockPrivilege 3840 powershell.exe Token: SeManageVolumePrivilege 3840 powershell.exe Token: 33 3840 powershell.exe Token: 34 3840 powershell.exe Token: 35 3840 powershell.exe Token: 36 3840 powershell.exe Token: SeIncreaseQuotaPrivilege 3840 powershell.exe Token: SeSecurityPrivilege 3840 powershell.exe Token: SeTakeOwnershipPrivilege 3840 powershell.exe Token: SeLoadDriverPrivilege 3840 powershell.exe Token: SeSystemProfilePrivilege 3840 powershell.exe Token: SeSystemtimePrivilege 3840 powershell.exe Token: SeProfSingleProcessPrivilege 3840 powershell.exe Token: SeIncBasePriorityPrivilege 3840 powershell.exe Token: SeCreatePagefilePrivilege 3840 powershell.exe Token: SeBackupPrivilege 3840 powershell.exe Token: SeRestorePrivilege 3840 powershell.exe Token: SeShutdownPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeSystemEnvironmentPrivilege 3840 powershell.exe Token: SeRemoteShutdownPrivilege 3840 powershell.exe Token: SeUndockPrivilege 3840 powershell.exe Token: SeManageVolumePrivilege 3840 powershell.exe Token: 33 3840 powershell.exe Token: 34 3840 powershell.exe Token: 35 3840 powershell.exe Token: 36 3840 powershell.exe Token: SeIncreaseQuotaPrivilege 3840 powershell.exe Token: SeSecurityPrivilege 3840 powershell.exe Token: SeTakeOwnershipPrivilege 3840 powershell.exe Token: SeLoadDriverPrivilege 3840 powershell.exe Token: SeSystemProfilePrivilege 3840 powershell.exe Token: SeSystemtimePrivilege 3840 powershell.exe Token: SeProfSingleProcessPrivilege 3840 powershell.exe Token: SeIncBasePriorityPrivilege 3840 powershell.exe Token: SeCreatePagefilePrivilege 3840 powershell.exe Token: SeBackupPrivilege 3840 powershell.exe Token: SeRestorePrivilege 3840 powershell.exe Token: SeShutdownPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeSystemEnvironmentPrivilege 3840 powershell.exe Token: SeRemoteShutdownPrivilege 3840 powershell.exe Token: SeUndockPrivilege 3840 powershell.exe Token: SeManageVolumePrivilege 3840 powershell.exe Token: 33 3840 powershell.exe Token: 34 3840 powershell.exe Token: 35 3840 powershell.exe Token: 36 3840 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3840 3932 file.exe 83 PID 3932 wrote to memory of 3840 3932 file.exe 83 PID 3932 wrote to memory of 728 3932 file.exe 87 PID 3932 wrote to memory of 728 3932 file.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\Admin\AppData/Roaming/Q1cL.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{630cd568-ce49-48e8-9fe1-8631344a8983}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" /s /i:INSTALL C:\Users\Admin\AppData/Roaming/Q1cL.ini2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:728
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/Q1cL.ini1⤵
- Loads dropped DLL
PID:1724
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/Q1cL.ini1⤵
- Loads dropped DLL
PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
601KB
MD5360e0cbf19c10f3f28c336ceb1373efe
SHA1f64ef6d518e81a1e4b6484d8785ba80de9480083
SHA2565fb2ad716b5822a7e869c66677c31d7350ad0ec845f28f3a216823635a38a120
SHA51264d2f67337243b5e1bc0533ff88211f3f1064d5bae815f9259a53340beff215b8410e08a51c204d333e60405817facec75cf8059784db548ebccc8177b8d69d4