Analysis

  • max time kernel
    94s
  • max time network
    296s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 00:23

General

  • Target

    newtt.pdf.exe

  • Size

    972KB

  • MD5

    0897304e5e056318413b793477142018

  • SHA1

    09299856fae087ac29d25cea697d974858a77796

  • SHA256

    8999a5fbe146e6183a2bffaae420236be218f3de96342e67642af88b2847b480

  • SHA512

    90258358ec5bae8dc594b4521ecae40b17fd0e48749a6991eb0a461db1d47d4e415482ef911b3a15cfd96a4722a0441c3701dd40d4f805cd64dce9098fe8a8d9

  • SSDEEP

    24576:cu6J33O0c+JY5UZ+XC0kGso6FaP3pRbWY:Gu0c++OCvkGs9FavOY

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\newtt.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\newtt.pdf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\ageless\Keily.exe
      "C:\Users\Admin\AppData\Local\Temp\newtt.pdf.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\newtt.pdf.exe"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\subpredication

    Filesize

    38KB

    MD5

    dddff28c705d3422a8b18cbdffd2d1ea

    SHA1

    4e18309a2caa0c186f1ce2b7cdc483429dde3d84

    SHA256

    2725d7547d369a8a2154ab86a8feb055596bfe2ccbfc2412c5ceabae2d946c4c

    SHA512

    d57be806ea43aa0ada997477527904ff30e39bc980e0b557ce0958cd48b88780da68cc2723d66549c5c283a03e8e20aa9580030e09ae255cac7a2b79ae6c2355

  • C:\Users\Admin\AppData\Local\ageless\Keily.exe

    Filesize

    972KB

    MD5

    0897304e5e056318413b793477142018

    SHA1

    09299856fae087ac29d25cea697d974858a77796

    SHA256

    8999a5fbe146e6183a2bffaae420236be218f3de96342e67642af88b2847b480

    SHA512

    90258358ec5bae8dc594b4521ecae40b17fd0e48749a6991eb0a461db1d47d4e415482ef911b3a15cfd96a4722a0441c3701dd40d4f805cd64dce9098fe8a8d9

  • memory/840-18-0x00000000011E0000-0x00000000015E0000-memory.dmp

    Filesize

    4.0MB

  • memory/1860-22-0x0000000004BC0000-0x0000000004C5C000-memory.dmp

    Filesize

    624KB

  • memory/1860-20-0x0000000000560000-0x0000000000570000-memory.dmp

    Filesize

    64KB

  • memory/1860-21-0x000000007505E000-0x000000007505F000-memory.dmp

    Filesize

    4KB

  • memory/1860-27-0x0000000005810000-0x0000000005DB4000-memory.dmp

    Filesize

    5.6MB

  • memory/1860-28-0x0000000005690000-0x0000000005722000-memory.dmp

    Filesize

    584KB

  • memory/1860-29-0x0000000005660000-0x000000000566A000-memory.dmp

    Filesize

    40KB

  • memory/1860-30-0x0000000075050000-0x0000000075800000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-31-0x000000007505E000-0x000000007505F000-memory.dmp

    Filesize

    4KB

  • memory/1860-32-0x00000000057A0000-0x0000000005806000-memory.dmp

    Filesize

    408KB

  • memory/1860-33-0x0000000075050000-0x0000000075800000-memory.dmp

    Filesize

    7.7MB

  • memory/3176-6-0x0000000001770000-0x0000000001B70000-memory.dmp

    Filesize

    4.0MB