Resubmissions
13/01/2025, 01:00
250113-bcnq5axqbt 1009/01/2025, 12:16
250109-pfhwyazjhs 1006/01/2025, 14:21
250106-rpb6vs1kgr 1002/01/2025, 20:47
250102-zlagvsvpdv 1002/01/2025, 20:45
250102-zjvd9ayjar 10Analysis
-
max time kernel
423s -
max time network
426s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/01/2025, 12:16
Behavioral task
behavioral1
Sample
Firefox Installer (ratted).exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Firefox Installer (ratted).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Firefox Installer (ratted).exe
Resource
win10ltsc2021-20241211-en
Errors
General
-
Target
Firefox Installer (ratted).exe
-
Size
170KB
-
MD5
200eb10c73336127006740ae06003933
-
SHA1
32ef06528018d4f9fc8da3a7e7e07363b3a143f4
-
SHA256
b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0
-
SHA512
026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce
-
SSDEEP
1536:4ig4nFL9z2BOwVCMs6se7llqn17KineXd2wVKtivEYoNRh8RX9EIKhI49No:5zFL9zWOw7sgbcUieNJqKoPC5+Lm
Malware Config
Extracted
xworm
5.0
109.231.31.129:2021
H7HNKbba3h7eEPOa
-
Install_directory
%AppData%
-
install_file
FlrefoxUpdate.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral4/memory/3108-1-0x0000000000150000-0x0000000000180000-memory.dmp family_xworm behavioral4/files/0x001d00000002aad8-6.dat family_xworm -
Xworm family
-
Executes dropped EXE 7 IoCs
pid Process 2044 FlrefoxUpdate.exe 2148 FlrefoxUpdate.exe 1036 FlrefoxUpdate.exe 240 FlrefoxUpdate.exe 3208 FlrefoxUpdate.exe 3084 FlrefoxUpdate.exe 5092 FlrefoxUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "55" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3108 Firefox Installer (ratted).exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3108 Firefox Installer (ratted).exe Token: SeDebugPrivilege 3108 Firefox Installer (ratted).exe Token: SeDebugPrivilege 2044 FlrefoxUpdate.exe Token: SeDebugPrivilege 2148 FlrefoxUpdate.exe Token: SeDebugPrivilege 1036 FlrefoxUpdate.exe Token: SeDebugPrivilege 240 FlrefoxUpdate.exe Token: SeDebugPrivilege 3208 FlrefoxUpdate.exe Token: SeDebugPrivilege 3084 FlrefoxUpdate.exe Token: SeDebugPrivilege 5092 FlrefoxUpdate.exe Token: SeShutdownPrivilege 2128 shutdown.exe Token: SeRemoteShutdownPrivilege 2128 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3108 Firefox Installer (ratted).exe 1348 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3108 wrote to memory of 3252 3108 Firefox Installer (ratted).exe 79 PID 3108 wrote to memory of 3252 3108 Firefox Installer (ratted).exe 79 PID 3108 wrote to memory of 2128 3108 Firefox Installer (ratted).exe 89 PID 3108 wrote to memory of 2128 3108 Firefox Installer (ratted).exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Firefox Installer (ratted).exe"C:\Users\Admin\AppData\Local\Temp\Firefox Installer (ratted).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FlrefoxUpdate" /tr "C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3252
-
-
C:\Windows\SYSTEM32\shutdown.exeshutdown.exe /f /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
C:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exeC:\Users\Admin\AppData\Roaming\FlrefoxUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a06855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
170KB
MD5200eb10c73336127006740ae06003933
SHA132ef06528018d4f9fc8da3a7e7e07363b3a143f4
SHA256b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0
SHA512026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce