Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe
Resource
win7-20240708-en
General
-
Target
58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe
-
Size
372KB
-
MD5
f9646131ff6c7b07e435791522b418b0
-
SHA1
c0b1be54b2915cc9df1011836402e981a5815c92
-
SHA256
58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210
-
SHA512
44b54b19f35b3aca440eb09b8babdd3b22bc934145857b24a91b6fe65f1a6b2106a4a49266c55552135c63f8b8f85bc7a5e99d458cb277e2216ab2b20da089a5
-
SSDEEP
3072:uD/0ZYthTLJRMB4IVGubl4m5plDzGuX7i2me4F8lpo6wB408ko/Z5hwy6q//kgrh:PYth1RiVGubCYfacu2tB3oB40zox4cf
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
178.215.224.142:4449
ywldammnmlcvkfaatp
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
xworm7000.duckdns.org:7000
178.215.224.142:7000
wDluQlkCVEcAclIo
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000017467-29.dat family_xworm behavioral1/memory/2752-32-0x0000000000B80000-0x0000000000B90000-memory.dmp family_xworm -
Vjw0rm family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000017447-23.dat family_asyncrat -
Blocklisted process makes network request 17 IoCs
flow pid Process 6 2772 WScript.exe 13 2772 WScript.exe 21 2772 WScript.exe 30 2772 WScript.exe 38 2772 WScript.exe 45 2772 WScript.exe 54 2772 WScript.exe 62 2772 WScript.exe 71 2772 WScript.exe 78 2772 WScript.exe 87 2772 WScript.exe 95 2772 WScript.exe 104 2772 WScript.exe 111 2772 WScript.exe 119 2772 WScript.exe 128 2772 WScript.exe 135 2772 WScript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk XClient.exe -
Executes dropped EXE 5 IoCs
pid Process 1668 Under Faxuler.exe 1060 0wazE.exe 2684 Client.exe 2752 XClient.exe 2556 0wazE.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\KNNEIOX550 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\info.js\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\windows" XClient.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2684 Client.exe 2684 Client.exe 2752 XClient.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe 2684 Client.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1060 0wazE.exe Token: SeDebugPrivilege 2752 XClient.exe Token: SeDebugPrivilege 2556 0wazE.exe Token: SeDebugPrivilege 2684 Client.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 Client.exe 2752 XClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1668 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 30 PID 2492 wrote to memory of 1668 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 30 PID 2492 wrote to memory of 1668 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 30 PID 2492 wrote to memory of 1060 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 31 PID 2492 wrote to memory of 1060 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 31 PID 2492 wrote to memory of 1060 2492 58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe 31 PID 1668 wrote to memory of 2772 1668 Under Faxuler.exe 32 PID 1668 wrote to memory of 2772 1668 Under Faxuler.exe 32 PID 1668 wrote to memory of 2772 1668 Under Faxuler.exe 32 PID 1668 wrote to memory of 2684 1668 Under Faxuler.exe 33 PID 1668 wrote to memory of 2684 1668 Under Faxuler.exe 33 PID 1668 wrote to memory of 2684 1668 Under Faxuler.exe 33 PID 1668 wrote to memory of 2752 1668 Under Faxuler.exe 34 PID 1668 wrote to memory of 2752 1668 Under Faxuler.exe 34 PID 1668 wrote to memory of 2752 1668 Under Faxuler.exe 34 PID 1668 wrote to memory of 2556 1668 Under Faxuler.exe 35 PID 1668 wrote to memory of 2556 1668 Under Faxuler.exe 35 PID 1668 wrote to memory of 2556 1668 Under Faxuler.exe 35 PID 1060 wrote to memory of 1680 1060 0wazE.exe 43 PID 1060 wrote to memory of 1680 1060 0wazE.exe 43 PID 1060 wrote to memory of 1680 1060 0wazE.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe"C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\info.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\0wazE.exe"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Users\Admin\AppData\Local\Temp\0wazE.exe"C:\Users\Admin\AppData\Local\Temp\0wazE.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1060 -s 6003⤵PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5e264fe3d12c6e1a0f1d7e9ed2261e92d
SHA17a0e223c6ee4da81b80f49cbe6a602b2b354b1ab
SHA2561a4bb157823139eff9b0bedce2a9452759ecc47801785743fb9667647347c4d5
SHA5128a7ff7c1cf941aa10641650056f71da6974984c7383dade8683d7fd24e1ebd078da76dcc622238594fd53295205753c59364a64eaa67f3a2ea8734e679533209
-
Filesize
74KB
MD50443ba1255e5419d79b3ed3382ec00ff
SHA1f8dcda47375189f3164fc8419f84fa92674e4710
SHA2569c238fa3c048bab6d3e72f171d2b3994ac1686477a4febdcb2fa7a8fa987c6f6
SHA512d10064412a09576ffc9b5e2d22a0ca97a65f70f19e80c3494c2c9e422a36169e13ac72a9d948308d3aa3ccedb03998996611963de71eeca05a0607beaa199374
-
Filesize
687KB
MD57beac06d9c9dc95b8dacd72d6ea87597
SHA1ccc9ef68f1781a7c5d2c9cc4ac57198698ec418e
SHA256be0986c1154533a6fa8ae0eb77c0f6c95ff5a153dd096b408888816f71fef835
SHA51204ff58b844a687aadb5f4243ef5431619b02036abb29768d77ca309039adb1505ff62853be6bae4c238e55a9645a916912d85445147652ff0cd7b3d35e80798f
-
Filesize
38KB
MD5789f782e9e3170fdbc5f69ad90f1fd54
SHA13e679929bc157c5a3f590ad15a9218c99fc2c1d3
SHA256563760d0e6a3933465fe1021323e33d82e16f91a7cd71abd3afae862af2ad338
SHA5125336464c17e4aa31b488f56025da479763c9292bd5fb354512d02c937c577494303fd0fee325ef25333f96839889f51bfbf4db0f98b42a22ee30613d96baf152
-
Filesize
3KB
MD5c9f85ebe8ae38f1bf04be9d4ebe82219
SHA1c72eeed1d5814247196b0c9935f6fa86c010e4c6
SHA256c0157ee7368a626b38657229ddd1e58d058e571fc83977c26a2f511c15197e37
SHA5125ba0756ac069a4c1b5d6d1fe47a20916494bbbd076dbce05d7eae6f17330a350b00903e4f7ffdb8b98ad3aa96e7b66913bef3b0c4cfc43a8219aa93613948ae8