Analysis
-
max time kernel
117s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 13:40
Behavioral task
behavioral1
Sample
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe
Resource
win7-20240903-en
General
-
Target
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe
-
Size
2.8MB
-
MD5
0c5dad3e8eb28ced1fa7dcff2099c889
-
SHA1
69af5491ceb2b2889e59ddf1fea5b445c0fe1dcb
-
SHA256
2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0
-
SHA512
359ea9db76eaba98ba520df8ebf973f3ef4dd6d0e3711c1d1ebf057e5c0f2650f2c6af1a9a5a3a55efa6d400e654f30a79df86f74042788e0748817f34d6eb8d
-
SSDEEP
49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR51:9FjtbO4PCtDKpohbx+b4aHA/QHr1
Malware Config
Extracted
xworm
canada-nervous.gl.at.ply.gg:26681
-
Install_directory
%AppData%
-
install_file
scvhost.exe
-
telegram
https://api.telegram.org/bot7556258236:AAFbbPTNmGub8pdNz3R3W7xxukN43pvt5Tc/sendMessage?chat_id=7191221522
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7a-28.dat family_xworm behavioral2/memory/1416-40-0x00000000003E0000-0x00000000003FA000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation TritonRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Triton Rat.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe -
Executes dropped EXE 5 IoCs
pid Process 3644 TritonRAT.exe 1416 Triton Rat.exe 984 TritonRAT.exe 2684 scvhost.exe 2584 scvhost.exe -
resource yara_rule behavioral2/memory/2112-10-0x0000000000120000-0x0000000002DB6000-memory.dmp themida behavioral2/memory/2112-11-0x0000000000120000-0x0000000002DB6000-memory.dmp themida behavioral2/memory/2112-41-0x0000000000120000-0x0000000002DB6000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\scvhost = "C:\\Users\\Admin\\AppData\\Roaming\\scvhost.exe" Triton Rat.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1416 Triton Rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 984 TritonRAT.exe 1416 Triton Rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1416 Triton Rat.exe Token: SeDebugPrivilege 984 TritonRAT.exe Token: SeDebugPrivilege 1416 Triton Rat.exe Token: SeDebugPrivilege 2684 scvhost.exe Token: SeDebugPrivilege 2584 scvhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1416 Triton Rat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3644 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 83 PID 2112 wrote to memory of 3644 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 83 PID 2112 wrote to memory of 1416 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 84 PID 2112 wrote to memory of 1416 2112 2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe 84 PID 3644 wrote to memory of 984 3644 TritonRAT.exe 86 PID 3644 wrote to memory of 984 3644 TritonRAT.exe 86 PID 1416 wrote to memory of 5076 1416 Triton Rat.exe 88 PID 1416 wrote to memory of 5076 1416 Triton Rat.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe"C:\Users\Admin\AppData\Local\Temp\2f3fb98cde0255f83e6c5f3e9676868fe17f969a7f6103fe5db3a791ff5325a0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\TritonRAT.exe"C:\Users\Admin\AppData\Roaming\TritonRAT.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
C:\Users\Admin\AppData\Roaming\Triton Rat.exe"C:\Users\Admin\AppData\Roaming\Triton Rat.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "scvhost" /tr "C:\Users\Admin\AppData\Roaming\scvhost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5076
-
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
38KB
MD557d29dcd5a7b20883382620736c868be
SHA1a26c5b6b4822e25d81929b72221be0ec1c2bcfc2
SHA256e0e5443f7f4b4eea98de47521407b609ac628f0a374d8f2c5d0e53dd6befc416
SHA5126b41d0e16156d61e96790b0e822f400275917d9234774c709577ae3dbb6fb834720ca7f0902672c1d0145df03c2ed36ae6a6e5bee1c1a3d5ceb26f56fd72908d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
85KB
MD5628a35d2e9e2283e7dbf88d54c2446f6
SHA1e4084bf55605bbeb15034edacb218cb62eb6d88f
SHA25638a301620b3c593084784a6f3885fa6959f93e6e9505eb4c54016a46d6c8435a
SHA5123ef86fcaca280e08bf0c7c2233ebb6a9c950f3aff1f2eb340d1c22bcd4b6619d9e55aa33d44004ed4e6d0eb8f5d2e48a0c3bc31a01bba337882cf1410c1326ce
-
Filesize
36.5MB
MD53e7800c74c9c7950bacf6739859caaee
SHA182faffb57a9ce69fe8b00aeb91f9644db0ebf7fe
SHA256c6d18577ef02f6f7ead2bd90a4a9e7d522ed8aa801949b910792dabd75849736
SHA512f511dabe5837442f44cee5f96ea20d393fb9d45a10c69a79326c45c768aa2780b26e7eacb4591becbf656ce5b8daf373ef25f2d20b06b2dbed5c47b1c4cee428