Analysis
-
max time kernel
115s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 03:54
Behavioral task
behavioral1
Sample
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe
Resource
win7-20240903-en
General
-
Target
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe
-
Size
2.8MB
-
MD5
abd473026ff01a89544052f0b7a437f0
-
SHA1
114aa2653ad093ca5964a798333407eaa5e2a35b
-
SHA256
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783
-
SHA512
3156af297e868ddf200efb1e8334959755ba6563447510472699ad282ad3503c04060d6faf0b6c4c429e8b71bf60fb7015c4e720df18360107ad5489126b8a21
-
SSDEEP
49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR5:9FjtbO4PCtDKpohbx+b4aHA/QHr
Malware Config
Extracted
xworm
canada-nervous.gl.at.ply.gg:26681
-
Install_directory
%AppData%
-
install_file
scvhost.exe
-
telegram
https://api.telegram.org/bot7556258236:AAFbbPTNmGub8pdNz3R3W7xxukN43pvt5Tc/sendMessage?chat_id=7191221522
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x00290000000150a7-29.dat family_xworm behavioral1/memory/2760-33-0x00000000003A0000-0x00000000003BA000-memory.dmp family_xworm behavioral1/memory/2660-48-0x0000000000D90000-0x0000000000DAA000-memory.dmp family_xworm behavioral1/memory/1680-51-0x00000000003B0000-0x00000000003CA000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.lnk Triton Rat.exe -
Executes dropped EXE 5 IoCs
pid Process 2760 Triton Rat.exe 2776 TritonRAT.exe 2560 TritonRAT.exe 2660 scvhost.exe 1680 scvhost.exe -
Loads dropped DLL 2 IoCs
pid Process 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
resource yara_rule behavioral1/memory/3036-15-0x0000000000A10000-0x00000000036A6000-memory.dmp themida behavioral1/memory/3036-16-0x0000000000A10000-0x00000000036A6000-memory.dmp themida behavioral1/memory/3036-32-0x0000000000A10000-0x00000000036A6000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\scvhost = "C:\\Users\\Admin\\AppData\\Roaming\\scvhost.exe" Triton Rat.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2080 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2760 Triton Rat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 2760 Triton Rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2760 Triton Rat.exe Token: SeDebugPrivilege 2760 Triton Rat.exe Token: SeDebugPrivilege 2660 scvhost.exe Token: SeDebugPrivilege 1680 scvhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 Triton Rat.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2776 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 30 PID 3036 wrote to memory of 2776 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 30 PID 3036 wrote to memory of 2776 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 30 PID 3036 wrote to memory of 2776 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 30 PID 3036 wrote to memory of 2760 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 31 PID 3036 wrote to memory of 2760 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 31 PID 3036 wrote to memory of 2760 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 31 PID 3036 wrote to memory of 2760 3036 eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe 31 PID 2776 wrote to memory of 2560 2776 TritonRAT.exe 32 PID 2776 wrote to memory of 2560 2776 TritonRAT.exe 32 PID 2776 wrote to memory of 2560 2776 TritonRAT.exe 32 PID 2560 wrote to memory of 2972 2560 TritonRAT.exe 33 PID 2560 wrote to memory of 2972 2560 TritonRAT.exe 33 PID 2560 wrote to memory of 2972 2560 TritonRAT.exe 33 PID 2760 wrote to memory of 2080 2760 Triton Rat.exe 34 PID 2760 wrote to memory of 2080 2760 Triton Rat.exe 34 PID 2760 wrote to memory of 2080 2760 Triton Rat.exe 34 PID 1228 wrote to memory of 2660 1228 taskeng.exe 39 PID 1228 wrote to memory of 2660 1228 taskeng.exe 39 PID 1228 wrote to memory of 2660 1228 taskeng.exe 39 PID 1228 wrote to memory of 1680 1228 taskeng.exe 40 PID 1228 wrote to memory of 1680 1228 taskeng.exe 40 PID 1228 wrote to memory of 1680 1228 taskeng.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe"C:\Users\Admin\AppData\Local\Temp\eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\TritonRAT.exe"C:\Users\Admin\AppData\Roaming\TritonRAT.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"C:\Users\Admin\AppData\Local\Temp\TritonRAT.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2560 -s 5284⤵PID:2972
-
-
-
-
C:\Users\Admin\AppData\Roaming\Triton Rat.exe"C:\Users\Admin\AppData\Roaming\Triton Rat.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "scvhost" /tr "C:\Users\Admin\AppData\Roaming\scvhost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2080
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C5011B68-2789-40BC-BCB7-4038EAD82DDA} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exeC:\Users\Admin\AppData\Roaming\scvhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD557d29dcd5a7b20883382620736c868be
SHA1a26c5b6b4822e25d81929b72221be0ec1c2bcfc2
SHA256e0e5443f7f4b4eea98de47521407b609ac628f0a374d8f2c5d0e53dd6befc416
SHA5126b41d0e16156d61e96790b0e822f400275917d9234774c709577ae3dbb6fb834720ca7f0902672c1d0145df03c2ed36ae6a6e5bee1c1a3d5ceb26f56fd72908d
-
Filesize
85KB
MD5628a35d2e9e2283e7dbf88d54c2446f6
SHA1e4084bf55605bbeb15034edacb218cb62eb6d88f
SHA25638a301620b3c593084784a6f3885fa6959f93e6e9505eb4c54016a46d6c8435a
SHA5123ef86fcaca280e08bf0c7c2233ebb6a9c950f3aff1f2eb340d1c22bcd4b6619d9e55aa33d44004ed4e6d0eb8f5d2e48a0c3bc31a01bba337882cf1410c1326ce
-
Filesize
36.5MB
MD53e7800c74c9c7950bacf6739859caaee
SHA182faffb57a9ce69fe8b00aeb91f9644db0ebf7fe
SHA256c6d18577ef02f6f7ead2bd90a4a9e7d522ed8aa801949b910792dabd75849736
SHA512f511dabe5837442f44cee5f96ea20d393fb9d45a10c69a79326c45c768aa2780b26e7eacb4591becbf656ce5b8daf373ef25f2d20b06b2dbed5c47b1c4cee428