Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 13:40
Behavioral task
behavioral1
Sample
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe
Resource
win7-20240903-en
General
-
Target
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe
-
Size
2.8MB
-
MD5
0c5dad3e8eb28ced1fa7dcff2099c889
-
SHA1
69af5491ceb2b2889e59ddf1fea5b445c0fe1dcb
-
SHA256
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0
-
SHA512
359ea9db76eaba98ba520df8ebf973f3ef4dd6d0e3711c1d1ebf057e5c0f2650f2c6af1a9a5a3a55efa6d400e654f30a79df86f74042788e0748817f34d6eb8d
-
SSDEEP
49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR51:9FjtbO4PCtDKpohbx+b4aHA/QHr1
Malware Config
Extracted
xworm
canada-nervous.gl.at.ply.gg:26681
-
Install_directory
%AppData%
-
install_file
scvhost.exe
-
telegram
https://api.telegram.org/bot7556258236:AAFbbPTNmGub8pdNz3R3W7xxukN43pvt5Tc/sendMessage?chat_id=7191221522
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016c9d-27.dat family_xworm behavioral1/memory/1428-32-0x0000000000B20000-0x0000000000B3A000-memory.dmp family_xworm behavioral1/memory/1852-47-0x00000000013D0000-0x00000000013EA000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe -
Executes dropped EXE 5 IoCs
pid Process 2372 TritonRAT.exe 1428 Triton Rat.exe 2980 TritonRAT.exe 1852 scvhost.exe 2264 scvhost.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
resource yara_rule behavioral1/memory/3020-15-0x0000000000BC0000-0x0000000003856000-memory.dmp themida behavioral1/memory/3020-16-0x0000000000BC0000-0x0000000003856000-memory.dmp themida behavioral1/memory/3020-33-0x0000000000BC0000-0x0000000003856000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\scvhost = "C:\\Users\\Admin\\AppData\\Roaming\\scvhost.exe" Triton Rat.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1980 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1428 Triton Rat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 1428 Triton Rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1428 Triton Rat.exe Token: SeDebugPrivilege 1428 Triton Rat.exe Token: SeDebugPrivilege 1852 scvhost.exe Token: SeDebugPrivilege 2264 scvhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1428 Triton Rat.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2372 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 30 PID 3020 wrote to memory of 2372 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 30 PID 3020 wrote to memory of 2372 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 30 PID 3020 wrote to memory of 2372 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 30 PID 3020 wrote to memory of 1428 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 31 PID 3020 wrote to memory of 1428 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 31 PID 3020 wrote to memory of 1428 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 31 PID 3020 wrote to memory of 1428 3020 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 31 PID 2372 wrote to memory of 2980 2372 TritonRAT.exe 32 PID 2372 wrote to memory of 2980 2372 TritonRAT.exe 32 PID 2372 wrote to memory of 2980 2372 TritonRAT.exe 32 PID 2980 wrote to memory of 2892 2980 TritonRAT.exe 33 PID 2980 wrote to memory of 2892 2980 TritonRAT.exe 33 PID 2980 wrote to memory of 2892 2980 TritonRAT.exe 33 PID 1428 wrote to memory of 1980 1428 Triton Rat.exe 35 PID 1428 wrote to memory of 1980 1428 Triton Rat.exe 35 PID 1428 wrote to memory of 1980 1428 Triton Rat.exe 35 PID 656 wrote to memory of 1852 656 taskeng.exe 39 PID 656 wrote to memory of 1852 656 taskeng.exe 39 PID 656 wrote to memory of 1852 656 taskeng.exe 39 PID 656 wrote to memory of 2264 656 taskeng.exe 40 PID 656 wrote to memory of 2264 656 taskeng.exe 40 PID 656 wrote to memory of 2264 656 taskeng.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe"C:\Users\Admin\AppData\Local\Temp\2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\TritonRAT.exe"C:\Users\Admin\AppData\Roaming\TritonRAT.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2980 -s 5284⤵PID:2892
-
-
-
-
C:\Users\Admin\AppData\Roaming\Triton Rat.exe"C:\Users\Admin\AppData\Roaming\Triton Rat.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "scvhost" /tr "C:\Users\Admin\AppData\Roaming\scvhost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FA9E7A4A-769C-486E-94C8-A95CFA126967} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD557d29dcd5a7b20883382620736c868be
SHA1a26c5b6b4822e25d81929b72221be0ec1c2bcfc2
SHA256e0e5443f7f4b4eea98de47521407b609ac628f0a374d8f2c5d0e53dd6befc416
SHA5126b41d0e16156d61e96790b0e822f400275917d9234774c709577ae3dbb6fb834720ca7f0902672c1d0145df03c2ed36ae6a6e5bee1c1a3d5ceb26f56fd72908d
-
Filesize
85KB
MD5628a35d2e9e2283e7dbf88d54c2446f6
SHA1e4084bf55605bbeb15034edacb218cb62eb6d88f
SHA25638a301620b3c593084784a6f3885fa6959f93e6e9505eb4c54016a46d6c8435a
SHA5123ef86fcaca280e08bf0c7c2233ebb6a9c950f3aff1f2eb340d1c22bcd4b6619d9e55aa33d44004ed4e6d0eb8f5d2e48a0c3bc31a01bba337882cf1410c1326ce
-
Filesize
36.5MB
MD53e7800c74c9c7950bacf6739859caaee
SHA182faffb57a9ce69fe8b00aeb91f9644db0ebf7fe
SHA256c6d18577ef02f6f7ead2bd90a4a9e7d522ed8aa801949b910792dabd75849736
SHA512f511dabe5837442f44cee5f96ea20d393fb9d45a10c69a79326c45c768aa2780b26e7eacb4591becbf656ce5b8daf373ef25f2d20b06b2dbed5c47b1c4cee428