Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 21:06
Behavioral task
behavioral1
Sample
gta.exe
Resource
win7-20240903-en
General
-
Target
gta.exe
-
Size
256KB
-
MD5
38405cd821fa35824d367aedff252ed2
-
SHA1
b70f9b3de189a89762d31caf11aafad410f2b1bd
-
SHA256
f8ed103574089d431ad8eaac8c8cba0240da701beb8df26011c7c97a6c981182
-
SHA512
c3225c965a817487ec0453a0ed9dd6807983fa3980fc5da2f9d8767fc7cbfa1557d2c0d8754c77be94217a5676737cdf152a64f383cebc2bf9f1198f5b7bd5a3
-
SSDEEP
3072:nOoQq3wNXKk2zg3bQqTJAOJh23R6eBdte1FKNfAc/vnew0sFetD79OzWPEMiZJ:nV+6/zcb9VGfAc/v10sQOzWPEh
Malware Config
Extracted
xworm
5.1
127.0.0.1:37897
global-protective.gl.at.ply.gg:37897:37897
global-protective.gl.at.ply.gg:37897
-
Install_directory
%ProgramData%
-
install_file
nerat.exe
-
telegram
https://api.telegram.org/bot7268785583:AAFvSoXRrVhV7krjc8W8iUc9VL5ZyOqftLY
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1688-1-0x0000000000070000-0x00000000000B4000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2208 powershell.exe 2688 powershell.exe 2560 powershell.exe 2552 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nerat.lnk gta.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nerat.lnk gta.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2208 powershell.exe 2688 powershell.exe 2560 powershell.exe 2552 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1688 gta.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 1688 gta.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2208 1688 gta.exe 32 PID 1688 wrote to memory of 2208 1688 gta.exe 32 PID 1688 wrote to memory of 2208 1688 gta.exe 32 PID 1688 wrote to memory of 2688 1688 gta.exe 34 PID 1688 wrote to memory of 2688 1688 gta.exe 34 PID 1688 wrote to memory of 2688 1688 gta.exe 34 PID 1688 wrote to memory of 2560 1688 gta.exe 36 PID 1688 wrote to memory of 2560 1688 gta.exe 36 PID 1688 wrote to memory of 2560 1688 gta.exe 36 PID 1688 wrote to memory of 2552 1688 gta.exe 38 PID 1688 wrote to memory of 2552 1688 gta.exe 38 PID 1688 wrote to memory of 2552 1688 gta.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\gta.exe"C:\Users\Admin\AppData\Local\Temp\gta.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\gta.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'gta.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\nerat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'nerat.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5fc1016e626c1fc6cdd8359226abb7776
SHA1ea5e452c75109cf150ccd1610c9b8c24204ea3df
SHA256ae2995f90ddde41cc16669dc7d091ea357cb5fe48f8a1bda9d3cde0dfe5ad170
SHA512ba670ba6c8a3d8002f0589ee6a5488243c8e8c34c4e933133da47fe78ec2ae077458fb76a92cf31efb5778b704b7625ad556be3738d8cab10f546f81b1eddfff