Analysis
-
max time kernel
68s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 09:56
Behavioral task
behavioral1
Sample
.exe
Resource
win7-20240729-en
Errors
General
-
Target
.exe
-
Size
36KB
-
MD5
773e091978fdcdb5f20a117c705c759e
-
SHA1
1f5889ac02c7e7060f7ac8772f317f2ffebdbc3c
-
SHA256
1baac16d05578f8e64687053dde830d9441cd7941cebbdda88338f1fab11fa1c
-
SHA512
017a41f88c976e51b5d73679c0c4801b30ac4a066f1b35d3846c2d1b989f464c501b74ede54ea0cf344c45d315647764b4bd939a0558bf0b73fdf630c546766d
-
SSDEEP
384:axTA5yOqIMtqfZD1vkSQLVxXafuYAJ7uxhXv9LzGJTiKTFFA5mpkFy7BLTQYZwn5:uTAJM/jPWzJzGdFFALFyn9CCOjh+Dqf
Malware Config
Extracted
xworm
5.0
loans-hamburg.gl.at.ply.gg:48460
LgXrKMAH0FAqHCUj
-
Install_directory
%AppData%
-
install_file
celex.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1760-1-0x0000000000900000-0x0000000000910000-memory.dmp family_xworm -
Xworm family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1704 netsh.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2840 attrib.exe 2880 attrib.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\celex.lnk .exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\celex.lnk .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Greatgame reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Greatgame cmd.exe File opened for modification C:\Windows\Greatgame cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2720 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 tskill.exe 2412 tskill.exe 2056 tskill.exe 2056 tskill.exe 2292 tskill.exe 2292 tskill.exe 2636 tskill.exe 2636 tskill.exe 1872 tskill.exe 1872 tskill.exe 2484 tskill.exe 2484 tskill.exe 1860 tskill.exe 1860 tskill.exe 988 tskill.exe 988 tskill.exe 2488 tskill.exe 2488 tskill.exe 2492 tskill.exe 2492 tskill.exe 2468 tskill.exe 2468 tskill.exe 2992 tskill.exe 2992 tskill.exe 2576 tskill.exe 2576 tskill.exe 2984 tskill.exe 2984 tskill.exe 684 tskill.exe 684 tskill.exe 1420 tskill.exe 1420 tskill.exe 1060 tskill.exe 1060 tskill.exe 264 tskill.exe 264 tskill.exe 1616 tskill.exe 1616 tskill.exe 3048 tskill.exe 3048 tskill.exe 1916 tskill.exe 1916 tskill.exe 1104 tskill.exe 1104 tskill.exe 1912 tskill.exe 1912 tskill.exe 2216 tskill.exe 2216 tskill.exe 2392 tskill.exe 2392 tskill.exe 952 tskill.exe 952 tskill.exe 1016 tskill.exe 1016 tskill.exe 2404 tskill.exe 2404 tskill.exe 1180 tskill.exe 1180 tskill.exe 1600 tskill.exe 1600 tskill.exe 2228 tskill.exe 2228 tskill.exe 2176 tskill.exe 2176 tskill.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1760 .exe Token: SeDebugPrivilege 1760 .exe Token: SeShutdownPrivilege 2376 shutdown.exe Token: SeRemoteShutdownPrivilege 2376 shutdown.exe Token: SeSystemtimePrivilege 1604 cmd.exe Token: SeSystemtimePrivilege 1604 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2092 1760 .exe 31 PID 1760 wrote to memory of 2092 1760 .exe 31 PID 1760 wrote to memory of 2092 1760 .exe 31 PID 1760 wrote to memory of 2324 1760 .exe 33 PID 1760 wrote to memory of 2324 1760 .exe 33 PID 1760 wrote to memory of 2324 1760 .exe 33 PID 2324 wrote to memory of 1956 2324 cmd.exe 35 PID 2324 wrote to memory of 1956 2324 cmd.exe 35 PID 2324 wrote to memory of 1956 2324 cmd.exe 35 PID 1956 wrote to memory of 1984 1956 net.exe 36 PID 1956 wrote to memory of 1984 1956 net.exe 36 PID 1956 wrote to memory of 1984 1956 net.exe 36 PID 2324 wrote to memory of 1704 2324 cmd.exe 37 PID 2324 wrote to memory of 1704 2324 cmd.exe 37 PID 2324 wrote to memory of 1704 2324 cmd.exe 37 PID 2324 wrote to memory of 2412 2324 cmd.exe 38 PID 2324 wrote to memory of 2412 2324 cmd.exe 38 PID 2324 wrote to memory of 2412 2324 cmd.exe 38 PID 2324 wrote to memory of 2056 2324 cmd.exe 39 PID 2324 wrote to memory of 2056 2324 cmd.exe 39 PID 2324 wrote to memory of 2056 2324 cmd.exe 39 PID 2324 wrote to memory of 2292 2324 cmd.exe 40 PID 2324 wrote to memory of 2292 2324 cmd.exe 40 PID 2324 wrote to memory of 2292 2324 cmd.exe 40 PID 2324 wrote to memory of 2636 2324 cmd.exe 41 PID 2324 wrote to memory of 2636 2324 cmd.exe 41 PID 2324 wrote to memory of 2636 2324 cmd.exe 41 PID 2324 wrote to memory of 1872 2324 cmd.exe 42 PID 2324 wrote to memory of 1872 2324 cmd.exe 42 PID 2324 wrote to memory of 1872 2324 cmd.exe 42 PID 2324 wrote to memory of 2484 2324 cmd.exe 43 PID 2324 wrote to memory of 2484 2324 cmd.exe 43 PID 2324 wrote to memory of 2484 2324 cmd.exe 43 PID 2324 wrote to memory of 1860 2324 cmd.exe 44 PID 2324 wrote to memory of 1860 2324 cmd.exe 44 PID 2324 wrote to memory of 1860 2324 cmd.exe 44 PID 2324 wrote to memory of 988 2324 cmd.exe 45 PID 2324 wrote to memory of 988 2324 cmd.exe 45 PID 2324 wrote to memory of 988 2324 cmd.exe 45 PID 2324 wrote to memory of 2488 2324 cmd.exe 46 PID 2324 wrote to memory of 2488 2324 cmd.exe 46 PID 2324 wrote to memory of 2488 2324 cmd.exe 46 PID 2324 wrote to memory of 2492 2324 cmd.exe 47 PID 2324 wrote to memory of 2492 2324 cmd.exe 47 PID 2324 wrote to memory of 2492 2324 cmd.exe 47 PID 2324 wrote to memory of 2468 2324 cmd.exe 48 PID 2324 wrote to memory of 2468 2324 cmd.exe 48 PID 2324 wrote to memory of 2468 2324 cmd.exe 48 PID 2324 wrote to memory of 2992 2324 cmd.exe 49 PID 2324 wrote to memory of 2992 2324 cmd.exe 49 PID 2324 wrote to memory of 2992 2324 cmd.exe 49 PID 2324 wrote to memory of 2576 2324 cmd.exe 50 PID 2324 wrote to memory of 2576 2324 cmd.exe 50 PID 2324 wrote to memory of 2576 2324 cmd.exe 50 PID 2324 wrote to memory of 2984 2324 cmd.exe 51 PID 2324 wrote to memory of 2984 2324 cmd.exe 51 PID 2324 wrote to memory of 2984 2324 cmd.exe 51 PID 2324 wrote to memory of 684 2324 cmd.exe 52 PID 2324 wrote to memory of 684 2324 cmd.exe 52 PID 2324 wrote to memory of 684 2324 cmd.exe 52 PID 2324 wrote to memory of 1420 2324 cmd.exe 53 PID 2324 wrote to memory of 1420 2324 cmd.exe 53 PID 2324 wrote to memory of 1420 2324 cmd.exe 53 PID 2324 wrote to memory of 1060 2324 cmd.exe 54 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2840 attrib.exe 2880 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jeqitp.bat" "2⤵PID:2092
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ntarmf.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\net.exenet stop ΓÇ£Security CenterΓÇ¥3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ΓÇ£Security CenterΓÇ¥4⤵PID:1984
-
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1704
-
-
C:\Windows\system32\tskill.exetskill /A av*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\system32\tskill.exetskill /A fire*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\system32\tskill.exetskill /A anti*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Windows\system32\tskill.exetskill /A spy*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\system32\tskill.exetskill /A bullguard3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Windows\system32\tskill.exetskill /A PersFw3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\system32\tskill.exetskill /A KAV*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\system32\tskill.exetskill /A ZONEALARM3⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Windows\system32\tskill.exetskill /A SAFEWEB3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\system32\tskill.exetskill /A OUTPOST3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\system32\tskill.exetskill /A nv*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Windows\system32\tskill.exetskill /A nav*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Windows\system32\tskill.exetskill /A F-*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Windows\system32\tskill.exetskill /A ESAFE3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\system32\tskill.exetskill /A cle3⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\system32\tskill.exetskill /A BLACKICE3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\system32\tskill.exetskill /A def*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\system32\tskill.exetskill /A kav3⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\system32\tskill.exetskill /A kav*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Windows\system32\tskill.exetskill /A avg*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Windows\system32\tskill.exetskill /A ash*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\system32\tskill.exetskill /A aswupdsv3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Windows\system32\tskill.exetskill /A ewid*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\system32\tskill.exetskill /A guard*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\system32\tskill.exetskill /A guar*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Windows\system32\tskill.exetskill /A gcasDt*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Windows\system32\tskill.exetskill /A msmp*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Windows\system32\tskill.exetskill /A mcafe*3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\system32\tskill.exetskill /A mghtml3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Windows\system32\tskill.exetskill /A msiexec3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Windows\system32\tskill.exetskill /A outpost3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\system32\tskill.exetskill /A isafe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Windows\system32\tskill.exetskill /A zap*3⤵PID:1800
-
-
C:\Windows\system32\tskill.exetskill /A zauinst3⤵PID:1756
-
-
C:\Windows\system32\tskill.exetskill /A upd*3⤵PID:2512
-
-
C:\Windows\system32\tskill.exetskill /A zlclien*3⤵PID:2448
-
-
C:\Windows\system32\tskill.exetskill /A minilog3⤵PID:892
-
-
C:\Windows\system32\tskill.exetskill /A cc*3⤵PID:840
-
-
C:\Windows\system32\tskill.exetskill /A norton*3⤵PID:948
-
-
C:\Windows\system32\tskill.exetskill /A norton au*3⤵PID:564
-
-
C:\Windows\system32\tskill.exetskill /A ccc*3⤵PID:2968
-
-
C:\Windows\system32\tskill.exetskill /A npfmn*3⤵PID:1696
-
-
C:\Windows\system32\tskill.exetskill /A loge*3⤵PID:1212
-
-
C:\Windows\system32\tskill.exetskill /A nisum*3⤵PID:980
-
-
C:\Windows\system32\tskill.exetskill /A issvc3⤵PID:2100
-
-
C:\Windows\system32\tskill.exetskill /A tmp*3⤵PID:2812
-
-
C:\Windows\system32\tskill.exetskill /A tmn*3⤵PID:1452
-
-
C:\Windows\system32\tskill.exetskill /A pcc*3⤵PID:2000
-
-
C:\Windows\system32\tskill.exetskill /A cpd*3⤵PID:2152
-
-
C:\Windows\system32\tskill.exetskill /A pop*3⤵PID:2348
-
-
C:\Windows\system32\tskill.exetskill /A pav*3⤵PID:2036
-
-
C:\Windows\system32\tskill.exetskill /A padmin3⤵PID:1544
-
-
C:\Windows\system32\tskill.exetskill /A panda*3⤵PID:772
-
-
C:\Windows\system32\tskill.exetskill /A avsch*3⤵PID:1488
-
-
C:\Windows\system32\tskill.exetskill /A sche*3⤵PID:2564
-
-
C:\Windows\system32\tskill.exetskill /A syman*3⤵PID:1748
-
-
C:\Windows\system32\tskill.exetskill /A virus*3⤵PID:820
-
-
C:\Windows\system32\tskill.exetskill /A realm*3⤵PID:1736
-
-
C:\Windows\system32\tskill.exetskill /A sweep*3⤵PID:1084
-
-
C:\Windows\system32\tskill.exetskill /A scan*3⤵PID:604
-
-
C:\Windows\system32\tskill.exetskill /A ad-*3⤵PID:2912
-
-
C:\Windows\system32\tskill.exetskill /A safe*3⤵PID:2112
-
-
C:\Windows\system32\tskill.exetskill /A avas*3⤵PID:2928
-
-
C:\Windows\system32\tskill.exetskill /A norm*3⤵PID:1080
-
-
C:\Windows\system32\tskill.exetskill /A offg*3⤵PID:3052
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\caosex.bat" "2⤵PID:1480
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jkwqsc.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\system32\cmd.execmd.exe3⤵PID:2776
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2808
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2796
-
-
C:\Windows\system32\calc.execalc3⤵PID:3032
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ3⤵
- Adds Run key to start application
- Modifies registry key
PID:2720
-
-
C:\Windows\system32\attrib.exeAttrib +r +h Greatgame.bat3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2840
-
-
C:\Windows\system32\attrib.exeAttrib +r +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2880
-
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL.SwapMouseButton3⤵PID:1568
-
-
C:\Windows\system32\calc.execalc3⤵PID:2264
-
-
C:\Windows\system32\tskill.exetskill msnmsgr3⤵PID:2760
-
-
C:\Windows\system32\tskill.exetskill LimeWire3⤵PID:2872
-
-
C:\Windows\system32\tskill.exetskill iexplore3⤵PID:2960
-
-
C:\Windows\system32\tskill.exetskill NMain3⤵PID:2652
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2612
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:1036
-
-
C:\Windows\system32\calc.execalc3⤵PID:2640
-
-
C:\Windows\system32\msg.exemsg * R.I.P3⤵PID:1636
-
-
C:\Windows\system32\msg.exemsg * R.I.P3⤵PID:2608
-
-
C:\Windows\system32\shutdown.exeshutdown -r -t 10 -c "VIRUS DETECTED"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2224
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2072
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:3004
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD543969db64bb4f7d31f3651b41dc52520
SHA1a1e9cf676d20c1e5ca3fb81d57ec47165bb0b762
SHA256205509320b1c17acffd2b73d68ff86b707b0a9e81e74d3e9e08ed32cd06271d2
SHA5125572e20121cc8e51f0cb8e932568ccb403bd1c5e42f8f04342f3d6d73c8e2434eed788cf90dc39fc131ffb49128174880a34e5dadf32e6f2a1fa633d8f6cb676
-
Filesize
153B
MD5a2b78d777e58cc921a8b1a5377bc8d4f
SHA11c4fb1f68cfb23224dba6328d458e0cf00d37614
SHA25634cdcb6fae891f2a9687496e5f42c0cf1a6f02c1ad90a45b9eee9aca74227f7d
SHA5122062c5e69e32cac48add6629fa7553e51740e29c35f63d30f01bb823fea2bd57914f390050d6ed04762e3cd1d90563033670bca761fe891cbaf1167b47b4918a
-
Filesize
1KB
MD5a42401cb47aac7e3876209252f1b3b61
SHA1c46ec3b343848d7c33badd19b5fb0539f2bdefe2
SHA256788523c660a809135c728ddc7cfcba58c13e4fd9a7cc74843bee9fd3311c8abd
SHA5123abc626c4cdd86736aa346ea4b89a5e8072c1068e4e3fcc4796afb5d41c085cfe616fab7b78709456ec0816298b1bee426559ee62524053485983bfffea71d15
-
Filesize
2KB
MD56ad62c6f745973fd96385d1cec1df44f
SHA1a77da5668ecd88ed4f7203a6f0415e37c6ce1550
SHA256af1a63840892d9890cfafab890413049b16c766857242ecd7394551c823df535
SHA512eec776d40f6688aa2824df6f4e143dc230058556f41bd48f674c8a660dc42656752c4fb64327a139ebdcbb5d251a0aa38222fbd2f5b1008aa05a41e62546f80c