Analysis
-
max time kernel
20s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 18:46
Behavioral task
behavioral1
Sample
Nova Perm premium.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nova Perm premium.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Nova Perm premium.exe
-
Size
35KB
-
MD5
d46d842f4dca865e747d78fd160b4ab2
-
SHA1
839aed104690bcb4b238dfb50709fe3e7e596df2
-
SHA256
d188547999283b2c4fe26ece445804c6908bc2881cdb496e8b85f842cca5e404
-
SHA512
a4bb1e549a67f704ea35e13372911b1a1d3d9c333972eadddd580e3f23fb911f15d0f5c1d0af58f19d330935140fb0e507a3a00f367c950ecfd6f8856f417a3c
-
SSDEEP
384:GxrwquEB4WIwkdoVpoFiQ4+YLsRQkX966LZT7BnA7vHsJQcXT/G58pkFyHBLTIZZ:qfnEd9rVBPph7GVFy79e0OjhAyEo
Malware Config
Extracted
xworm
5.0
kit-enrollment.gl.at.ply.gg:55332
IoEuZ1j6rJu0qWPX
-
Install_directory
%ProgramData%
-
install_file
svhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1800-1-0x0000000000AF0000-0x0000000000B00000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk Nova Perm premium.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk Nova Perm premium.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhost = "C:\\ProgramData\\svhost.exe" Nova Perm premium.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1800 Nova Perm premium.exe Token: SeDebugPrivilege 1800 Nova Perm premium.exe Token: SeShutdownPrivilege 2900 shutdown.exe Token: SeRemoteShutdownPrivilege 2900 shutdown.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2900 1800 Nova Perm premium.exe 32 PID 1800 wrote to memory of 2900 1800 Nova Perm premium.exe 32 PID 1800 wrote to memory of 2900 1800 Nova Perm premium.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nova Perm premium.exe"C:\Users\Admin\AppData\Local\Temp\Nova Perm premium.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\shutdown.exeshutdown.exe /f /r /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2696
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2568