General
-
Target
spf.exe
-
Size
66.1MB
-
Sample
241231-j4z78stncq
-
MD5
2424c3fe215d77e8e460a8f6796de636
-
SHA1
07b47f0878c5859b6681c6bd14cf2a464729f330
-
SHA256
dba0c17d6101161862cb98fd0d5cc2c9c196ef3c561a6159d4df9cff2da4cc8f
-
SHA512
52208cef403e4d36cd0704e8da0e159511a28ad972176e3dbc7fd47111cd4a5e0331d22df4f89d939b6a317d51345818f9bcc24219c9d0fc8818c005ecf7238a
-
SSDEEP
1572864:nu43xWJUEl1vVvo3fXzU/Pymw7NtvPeJxHIa6p02SfkHn4HfQ:nu4BaUEPdvo3fXziqdNJ0H+0hkHMI
Static task
static1
Behavioral task
behavioral1
Sample
spf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
cash-infections.gl.at.ply.gg:54632
uaiEP0l5RwMqBswG
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Targets
-
-
Target
spf.exe
-
Size
66.1MB
-
MD5
2424c3fe215d77e8e460a8f6796de636
-
SHA1
07b47f0878c5859b6681c6bd14cf2a464729f330
-
SHA256
dba0c17d6101161862cb98fd0d5cc2c9c196ef3c561a6159d4df9cff2da4cc8f
-
SHA512
52208cef403e4d36cd0704e8da0e159511a28ad972176e3dbc7fd47111cd4a5e0331d22df4f89d939b6a317d51345818f9bcc24219c9d0fc8818c005ecf7238a
-
SSDEEP
1572864:nu43xWJUEl1vVvo3fXzU/Pymw7NtvPeJxHIa6p02SfkHn4HfQ:nu4BaUEPdvo3fXziqdNJ0H+0hkHMI
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1