Analysis
-
max time kernel
94s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe
Resource
win7-20241023-en
General
-
Target
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe
-
Size
1.8MB
-
MD5
58f824a8f6a71da8e9a1acc97fc26d52
-
SHA1
b0e199e6f85626edebbecd13609a011cf953df69
-
SHA256
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
-
SHA512
7d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
SSDEEP
49152:OA12qngJy5Eptzh8wg9fmH5pKKMmDiuV:OHJyEptzh8n05QHwV
Malware Config
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3252-13-0x0000000009E40000-0x0000000009E4E000-memory.dmp disable_win_def -
Detect Umbral payload 2 IoCs
resource yara_rule behavioral2/files/0x000b0000000219e8-68.dat family_umbral behavioral2/memory/5100-75-0x00000272E4DF0000-0x00000272E4E30000-memory.dmp family_umbral -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/3252-1-0x0000000000A20000-0x0000000000E96000-memory.dmp family_xworm behavioral2/memory/3252-2-0x0000000000A20000-0x0000000000E96000-memory.dmp family_xworm behavioral2/memory/3252-201-0x0000000000A20000-0x0000000000E96000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3252-160-0x000000000BC70000-0x000000000BD90000-memory.dmp family_stormkitty -
Stormkitty family
-
Umbral family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2188 powershell.exe 2460 powershell.exe 3392 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts ddwhqo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Executes dropped EXE 2 IoCs
pid Process 3840 iuuiuc.exe 5100 ddwhqo.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 47 discord.com 48 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000c0000000219e5-59.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4560 3252 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1468 cmd.exe 3036 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3960 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3036 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 5100 ddwhqo.exe 2188 powershell.exe 2188 powershell.exe 2460 powershell.exe 2460 powershell.exe 3392 powershell.exe 3392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe Token: SeDebugPrivilege 5100 ddwhqo.exe Token: SeIncreaseQuotaPrivilege 1476 wmic.exe Token: SeSecurityPrivilege 1476 wmic.exe Token: SeTakeOwnershipPrivilege 1476 wmic.exe Token: SeLoadDriverPrivilege 1476 wmic.exe Token: SeSystemProfilePrivilege 1476 wmic.exe Token: SeSystemtimePrivilege 1476 wmic.exe Token: SeProfSingleProcessPrivilege 1476 wmic.exe Token: SeIncBasePriorityPrivilege 1476 wmic.exe Token: SeCreatePagefilePrivilege 1476 wmic.exe Token: SeBackupPrivilege 1476 wmic.exe Token: SeRestorePrivilege 1476 wmic.exe Token: SeShutdownPrivilege 1476 wmic.exe Token: SeDebugPrivilege 1476 wmic.exe Token: SeSystemEnvironmentPrivilege 1476 wmic.exe Token: SeRemoteShutdownPrivilege 1476 wmic.exe Token: SeUndockPrivilege 1476 wmic.exe Token: SeManageVolumePrivilege 1476 wmic.exe Token: 33 1476 wmic.exe Token: 34 1476 wmic.exe Token: 35 1476 wmic.exe Token: 36 1476 wmic.exe Token: SeIncreaseQuotaPrivilege 1476 wmic.exe Token: SeSecurityPrivilege 1476 wmic.exe Token: SeTakeOwnershipPrivilege 1476 wmic.exe Token: SeLoadDriverPrivilege 1476 wmic.exe Token: SeSystemProfilePrivilege 1476 wmic.exe Token: SeSystemtimePrivilege 1476 wmic.exe Token: SeProfSingleProcessPrivilege 1476 wmic.exe Token: SeIncBasePriorityPrivilege 1476 wmic.exe Token: SeCreatePagefilePrivilege 1476 wmic.exe Token: SeBackupPrivilege 1476 wmic.exe Token: SeRestorePrivilege 1476 wmic.exe Token: SeShutdownPrivilege 1476 wmic.exe Token: SeDebugPrivilege 1476 wmic.exe Token: SeSystemEnvironmentPrivilege 1476 wmic.exe Token: SeRemoteShutdownPrivilege 1476 wmic.exe Token: SeUndockPrivilege 1476 wmic.exe Token: SeManageVolumePrivilege 1476 wmic.exe Token: 33 1476 wmic.exe Token: 34 1476 wmic.exe Token: 35 1476 wmic.exe Token: 36 1476 wmic.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeIncreaseQuotaPrivilege 2464 wmic.exe Token: SeSecurityPrivilege 2464 wmic.exe Token: SeTakeOwnershipPrivilege 2464 wmic.exe Token: SeLoadDriverPrivilege 2464 wmic.exe Token: SeSystemProfilePrivilege 2464 wmic.exe Token: SeSystemtimePrivilege 2464 wmic.exe Token: SeProfSingleProcessPrivilege 2464 wmic.exe Token: SeIncBasePriorityPrivilege 2464 wmic.exe Token: SeCreatePagefilePrivilege 2464 wmic.exe Token: SeBackupPrivilege 2464 wmic.exe Token: SeRestorePrivilege 2464 wmic.exe Token: SeShutdownPrivilege 2464 wmic.exe Token: SeDebugPrivilege 2464 wmic.exe Token: SeSystemEnvironmentPrivilege 2464 wmic.exe Token: SeRemoteShutdownPrivilege 2464 wmic.exe Token: SeUndockPrivilege 2464 wmic.exe Token: SeManageVolumePrivilege 2464 wmic.exe Token: 33 2464 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3840 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 99 PID 3252 wrote to memory of 3840 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 99 PID 3252 wrote to memory of 5100 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 100 PID 3252 wrote to memory of 5100 3252 5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe 100 PID 5100 wrote to memory of 1476 5100 ddwhqo.exe 102 PID 5100 wrote to memory of 1476 5100 ddwhqo.exe 102 PID 5100 wrote to memory of 3996 5100 ddwhqo.exe 104 PID 5100 wrote to memory of 3996 5100 ddwhqo.exe 104 PID 5100 wrote to memory of 2188 5100 ddwhqo.exe 106 PID 5100 wrote to memory of 2188 5100 ddwhqo.exe 106 PID 5100 wrote to memory of 2460 5100 ddwhqo.exe 108 PID 5100 wrote to memory of 2460 5100 ddwhqo.exe 108 PID 5100 wrote to memory of 2464 5100 ddwhqo.exe 110 PID 5100 wrote to memory of 2464 5100 ddwhqo.exe 110 PID 5100 wrote to memory of 4404 5100 ddwhqo.exe 112 PID 5100 wrote to memory of 4404 5100 ddwhqo.exe 112 PID 5100 wrote to memory of 1608 5100 ddwhqo.exe 114 PID 5100 wrote to memory of 1608 5100 ddwhqo.exe 114 PID 5100 wrote to memory of 3392 5100 ddwhqo.exe 116 PID 5100 wrote to memory of 3392 5100 ddwhqo.exe 116 PID 5100 wrote to memory of 3960 5100 ddwhqo.exe 118 PID 5100 wrote to memory of 3960 5100 ddwhqo.exe 118 PID 5100 wrote to memory of 1468 5100 ddwhqo.exe 120 PID 5100 wrote to memory of 1468 5100 ddwhqo.exe 120 PID 1468 wrote to memory of 3036 1468 cmd.exe 122 PID 1468 wrote to memory of 3036 1468 cmd.exe 122 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3996 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe"C:\Users\Admin\AppData\Local\Temp\5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\iuuiuc.exe"C:\Users\Admin\AppData\Local\Temp\iuuiuc.exe"2⤵
- Executes dropped EXE
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\ddwhqo.exe"C:\Users\Admin\AppData\Local\Temp\ddwhqo.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\ddwhqo.exe"3⤵
- Views/modifies file attributes
PID:3996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ddwhqo.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:4404
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:3960
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\ddwhqo.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 34762⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3252 -ip 32521⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
1KB
MD5cd39f9323f55e90e1676c6ff3ae00245
SHA1135fef9e97783b49d60618363d2b61db5f0c4e04
SHA2560f22945ed958ba16bd71bc407b06eef3946038a9e42b90256d935e8d7e470728
SHA512bd237012c0eca5f86e832b521db4a60436795c65032bf29da41984106c46d4685d6933b61df1e7934e4021b68ec9feb5de80c1ba4445c85982c856b947dc2453
-
Filesize
948B
MD53c8a366519ecee9ebe2ece191eac12cc
SHA14e1f73acf0f809aaecf8f21829d83de6a6d999b5
SHA2561e023a8562e2db778fc8bedf9bd7f9fe5a04b0758501255f685c835637731c1a
SHA5121013cf15e31146bbfba3fdd1a95d5676792b8d69f6e8217f6c494c115e25c825fdd7aecd37c993879ac5a553457d7e3ffc8a2159a91bf83b1b66ca4180257270
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
231KB
MD53ae3cf78d1b188ca228e6e0479acbced
SHA16aca115b369169f1992d08e5439d5a58b74b4e75
SHA25699748fc0a0e244e2b6c1bbba4a2f8bf548011663d235a2a10b8c908a8128c18f
SHA5123adfbbdfc2eee34bda5c16005a32381113c9d774fdb64ed1896ad736497ab0c4f5493802519c6031ad780e6a1d2e195ffd1b4c6822a89e4fafb2517b1eeff8b2
-
Filesize
1.6MB
MD5583d187384f6ffb863c6dceb99382413
SHA1f8c93a13105eec96395e4cf0eb9b81d35fa85d5e
SHA2561e568ef24328e5d91864810ada4e4b318ad147b626bc648507405e0e85feb322
SHA512ec21559d0a9761a4464dbaf0c193fc0493367e287f96ccae63960b92604b2bba0435e6716f5c16de99603e7e4f8d6fe6fb117e543227b2ccecb980fa6c6a2005