Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
matrix.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
matrix.exe
Resource
win10v2004-20241007-en
General
-
Target
matrix.exe
-
Size
7.1MB
-
MD5
11b902db9f1d4dec6a2c416492a3a038
-
SHA1
1443ee1ca3d14d2bde269c63d33d76a958674daa
-
SHA256
a816679c8a1f078c6ed23ed1cdbd5afe58c4561c0a532d54e82f473fbb9af19e
-
SHA512
aee89808a6ee779b02514dbf30adfe5dea09cf4aeccfe9dab04b9f5162c3896f7f3a9ff29f0fa7abe132156b354f4465445c16b515faf2079b5ab11225da853a
-
SSDEEP
98304:4f7DWu05E8BLHISMHtdTeMCL52PAeZ1cxhZgiIPMpbUteXfb4RbkRZciV6SpAJDz:ioEeB5mhZ1sbpTX0RbwRpAJDv/
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
fat-pads.gl.at.ply.gg:35059
e564aa028dc627deeaa119b78ed54d5e
-
reg_key
e564aa028dc627deeaa119b78ed54d5e
-
splitter
Y262SUCZ4UJJ
Extracted
xworm
5.0
fat-pads.gl.at.ply.gg:35059
9AxQwGpimVT3I78A
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2380-28-0x0000000000320000-0x0000000000330000-memory.dmp family_xworm behavioral1/files/0x00070000000186ed-16.dat family_xworm behavioral1/memory/2288-104-0x0000000000E00000-0x0000000000E10000-memory.dmp family_xworm behavioral1/memory/2936-127-0x0000000000FC0000-0x0000000000FD0000-memory.dmp family_xworm -
Njrat family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 816 powershell.exe 480 powershell.exe 2668 powershell.exe 3036 powershell.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boost.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e564aa028dc627deeaa119b78ed54d5e.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e564aa028dc627deeaa119b78ed54d5e.exe dllhost.exe -
Executes dropped EXE 10 IoCs
pid Process 1052 Built.exe 2380 XClient.exe 2040 Payload.exe 2928 BootstrapperV1.23.exe 2924 Built.exe 1088 Process not Found 848 dllhost.exe 2288 boost 2936 boost 2316 boost -
Loads dropped DLL 12 IoCs
pid Process 2020 matrix.exe 2020 matrix.exe 1052 Built.exe 2808 Process not Found 2924 Built.exe 2040 Payload.exe 1196 WerFault.exe 1196 WerFault.exe 1196 WerFault.exe 1196 WerFault.exe 1196 WerFault.exe 1088 Process not Found -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\boost = "C:\\Users\\Admin\\AppData\\Roaming\\boost" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\e564aa028dc627deeaa119b78ed54d5e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\e564aa028dc627deeaa119b78ed54d5e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dllhost.exe\" .." dllhost.exe -
resource yara_rule behavioral1/memory/2924-58-0x000007FEF27C0000-0x000007FEF2DA8000-memory.dmp upx behavioral1/files/0x000500000001957e-56.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2684 ipconfig.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 816 powershell.exe 3036 powershell.exe 480 powershell.exe 2668 powershell.exe 2380 XClient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2380 XClient.exe Token: SeDebugPrivilege 816 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 480 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeIncreaseQuotaPrivilege 2300 WMIC.exe Token: SeSecurityPrivilege 2300 WMIC.exe Token: SeTakeOwnershipPrivilege 2300 WMIC.exe Token: SeLoadDriverPrivilege 2300 WMIC.exe Token: SeSystemProfilePrivilege 2300 WMIC.exe Token: SeSystemtimePrivilege 2300 WMIC.exe Token: SeProfSingleProcessPrivilege 2300 WMIC.exe Token: SeIncBasePriorityPrivilege 2300 WMIC.exe Token: SeCreatePagefilePrivilege 2300 WMIC.exe Token: SeBackupPrivilege 2300 WMIC.exe Token: SeRestorePrivilege 2300 WMIC.exe Token: SeShutdownPrivilege 2300 WMIC.exe Token: SeDebugPrivilege 2300 WMIC.exe Token: SeSystemEnvironmentPrivilege 2300 WMIC.exe Token: SeRemoteShutdownPrivilege 2300 WMIC.exe Token: SeUndockPrivilege 2300 WMIC.exe Token: SeManageVolumePrivilege 2300 WMIC.exe Token: 33 2300 WMIC.exe Token: 34 2300 WMIC.exe Token: 35 2300 WMIC.exe Token: SeIncreaseQuotaPrivilege 2300 WMIC.exe Token: SeSecurityPrivilege 2300 WMIC.exe Token: SeTakeOwnershipPrivilege 2300 WMIC.exe Token: SeLoadDriverPrivilege 2300 WMIC.exe Token: SeSystemProfilePrivilege 2300 WMIC.exe Token: SeSystemtimePrivilege 2300 WMIC.exe Token: SeProfSingleProcessPrivilege 2300 WMIC.exe Token: SeIncBasePriorityPrivilege 2300 WMIC.exe Token: SeCreatePagefilePrivilege 2300 WMIC.exe Token: SeBackupPrivilege 2300 WMIC.exe Token: SeRestorePrivilege 2300 WMIC.exe Token: SeShutdownPrivilege 2300 WMIC.exe Token: SeDebugPrivilege 2300 WMIC.exe Token: SeSystemEnvironmentPrivilege 2300 WMIC.exe Token: SeRemoteShutdownPrivilege 2300 WMIC.exe Token: SeUndockPrivilege 2300 WMIC.exe Token: SeManageVolumePrivilege 2300 WMIC.exe Token: 33 2300 WMIC.exe Token: 34 2300 WMIC.exe Token: 35 2300 WMIC.exe Token: SeDebugPrivilege 2928 BootstrapperV1.23.exe Token: SeDebugPrivilege 2380 XClient.exe Token: SeDebugPrivilege 2288 boost Token: SeDebugPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe Token: SeIncBasePriorityPrivilege 848 dllhost.exe Token: 33 848 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 XClient.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1052 2020 matrix.exe 31 PID 2020 wrote to memory of 1052 2020 matrix.exe 31 PID 2020 wrote to memory of 1052 2020 matrix.exe 31 PID 2020 wrote to memory of 2380 2020 matrix.exe 32 PID 2020 wrote to memory of 2380 2020 matrix.exe 32 PID 2020 wrote to memory of 2380 2020 matrix.exe 32 PID 2020 wrote to memory of 2040 2020 matrix.exe 33 PID 2020 wrote to memory of 2040 2020 matrix.exe 33 PID 2020 wrote to memory of 2040 2020 matrix.exe 33 PID 2020 wrote to memory of 2040 2020 matrix.exe 33 PID 2020 wrote to memory of 2928 2020 matrix.exe 34 PID 2020 wrote to memory of 2928 2020 matrix.exe 34 PID 2020 wrote to memory of 2928 2020 matrix.exe 34 PID 1052 wrote to memory of 2924 1052 Built.exe 36 PID 1052 wrote to memory of 2924 1052 Built.exe 36 PID 1052 wrote to memory of 2924 1052 Built.exe 36 PID 2928 wrote to memory of 2936 2928 BootstrapperV1.23.exe 58 PID 2928 wrote to memory of 2936 2928 BootstrapperV1.23.exe 58 PID 2928 wrote to memory of 2936 2928 BootstrapperV1.23.exe 58 PID 2936 wrote to memory of 2684 2936 cmd.exe 39 PID 2936 wrote to memory of 2684 2936 cmd.exe 39 PID 2936 wrote to memory of 2684 2936 cmd.exe 39 PID 2380 wrote to memory of 816 2380 XClient.exe 40 PID 2380 wrote to memory of 816 2380 XClient.exe 40 PID 2380 wrote to memory of 816 2380 XClient.exe 40 PID 2380 wrote to memory of 3036 2380 XClient.exe 42 PID 2380 wrote to memory of 3036 2380 XClient.exe 42 PID 2380 wrote to memory of 3036 2380 XClient.exe 42 PID 2380 wrote to memory of 480 2380 XClient.exe 44 PID 2380 wrote to memory of 480 2380 XClient.exe 44 PID 2380 wrote to memory of 480 2380 XClient.exe 44 PID 2380 wrote to memory of 2668 2380 XClient.exe 46 PID 2380 wrote to memory of 2668 2380 XClient.exe 46 PID 2380 wrote to memory of 2668 2380 XClient.exe 46 PID 2928 wrote to memory of 1620 2928 BootstrapperV1.23.exe 48 PID 2928 wrote to memory of 1620 2928 BootstrapperV1.23.exe 48 PID 2928 wrote to memory of 1620 2928 BootstrapperV1.23.exe 48 PID 1620 wrote to memory of 2300 1620 cmd.exe 50 PID 1620 wrote to memory of 2300 1620 cmd.exe 50 PID 1620 wrote to memory of 2300 1620 cmd.exe 50 PID 2380 wrote to memory of 1596 2380 XClient.exe 52 PID 2380 wrote to memory of 1596 2380 XClient.exe 52 PID 2380 wrote to memory of 1596 2380 XClient.exe 52 PID 2040 wrote to memory of 848 2040 Payload.exe 54 PID 2040 wrote to memory of 848 2040 Payload.exe 54 PID 2040 wrote to memory of 848 2040 Payload.exe 54 PID 2040 wrote to memory of 848 2040 Payload.exe 54 PID 2928 wrote to memory of 1196 2928 BootstrapperV1.23.exe 55 PID 2928 wrote to memory of 1196 2928 BootstrapperV1.23.exe 55 PID 2928 wrote to memory of 1196 2928 BootstrapperV1.23.exe 55 PID 1360 wrote to memory of 2288 1360 taskeng.exe 57 PID 1360 wrote to memory of 2288 1360 taskeng.exe 57 PID 1360 wrote to memory of 2288 1360 taskeng.exe 57 PID 1360 wrote to memory of 2936 1360 taskeng.exe 58 PID 1360 wrote to memory of 2936 1360 taskeng.exe 58 PID 1360 wrote to memory of 2936 1360 taskeng.exe 58 PID 1360 wrote to memory of 2316 1360 taskeng.exe 59 PID 1360 wrote to memory of 2316 1360 taskeng.exe 59 PID 1360 wrote to memory of 2316 1360 taskeng.exe 59 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\matrix.exe"C:\Users\Admin\AppData\Local\Temp\matrix.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\boost'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'boost'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "boost" /tr "C:\Users\Admin\AppData\Roaming\boost"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.23.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.23.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\cmd.exe"cmd" /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2684
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")3⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\Wbem\WMIC.exewmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2928 -s 11283⤵
- Loads dropped DLL
PID:1196
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7C759220-E893-44D6-9124-304E486B9A77} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Roaming\boostC:\Users\Admin\AppData\Roaming\boost2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Users\Admin\AppData\Roaming\boostC:\Users\Admin\AppData\Roaming\boost2⤵
- Executes dropped EXE
PID:2936
-
-
C:\Users\Admin\AppData\Roaming\boostC:\Users\Admin\AppData\Roaming\boost2⤵
- Executes dropped EXE
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD502c70d9d6696950c198db93b7f6a835e
SHA130231a467a49cc37768eea0f55f4bea1cbfb48e2
SHA2568f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
SHA512431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
-
Filesize
6.9MB
MD5ba5e8293e3f5df06609957574ebda500
SHA104b5fb00ae26fcd5804e5b8829f90a58d7bb6c98
SHA256bdc7f8370f86a4e26e64289f4ec98b47280a583acdb00878b08cb06b8d6c7f72
SHA512a6ba9cb1063aeec75edda47f671bd69766f1922ce76519a92439a2d7c47b443e4ef94b77394c0352386166beed47a63e3c33f77eb52f7f7bc428b3788f864d44
-
Filesize
55KB
MD549550e5c3979b41adc5f160884ea1438
SHA17dcbbbd74bff8e991e0c517bfb2e4552553e7d8d
SHA2562206884a8a62ba3b46c973f1131f807282eab756da08f7903b60954081ed9406
SHA512d7082b81c74c8b41b163140f4273df30a5b12d7b7671d061ca7d77b73de64cec2845fb4eb78fc937e7692148541da67ec7a4eb2f09b4cf495fbcf9a740736d25
-
Filesize
40KB
MD50bdc464106c1752b5016f399287e8e09
SHA18683d5b9902e7317f292e594c0d6c73f61a5b2fc
SHA256e315e0c86b7692bb30acb552bb9a1217b2b5fd8efc4d39f91de83531717c9e00
SHA5128291b18b4f3e6f4ab9bb31c402aa96f4b1d1702e1c2c52858d8e675a9e04542a17ef9bde3e809922bfb2dad99e662326735caa5f79b134abf96f11bd03d3c151
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BJ9Y0LGB8WAH9F920RP5.temp
Filesize7KB
MD5f2035f676827fb41bd33ab15469c1100
SHA109f112fb2b1406cc83d22eb06de13d77e699820e
SHA256d3bb4ca997711c743cac62e348b710e3ca4b1d4aabef1459f97868fdef09605c
SHA512e0515f6b799786229fb4b8283648d20decf9b6d5a0ed600a70f10a8e72fe68d14bf0841cfde59f2b716a0b50e84d25ecd22550623fb25ab951577cb59f9de5b5
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31