Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 19:12
Static task
static1
Behavioral task
behavioral1
Sample
vers2.0.0-installx64.exe
Resource
win7-20240903-en
General
-
Target
vers2.0.0-installx64.exe
-
Size
3.6MB
-
MD5
62af7389396c21b283d8655e7562d106
-
SHA1
c54841ab13b60aaf222b926f787c8669564a8090
-
SHA256
da320fb9d212b7d38eb28a54e1283bb4e9546ee5009540f46aff61083fecbed0
-
SHA512
9967b67006ba3a4ec6c13025b84ba42a112ccce4c38040f3849b001d39d27febf746f6e46e6a2673f3769fdbc4dff94f722fe5593e06d6ee82c176619b7e75c3
-
SSDEEP
98304:9EmUsgCgxpVbU/g6+WJdDldtYqdqbqjom6/JfS1:WVbU/gAhdtYqAgkJfS
Malware Config
Extracted
xworm
127.0.0.1:7000
-
Install_directory
%LocalAppData%
Extracted
quasar
1.4.1
CHXMP
8.8.8.8:4337
d0ee0679-1d6f-403e-a05a-fa08da0e7baa
-
encryption_key
3D2B9436E897CB92D0C2E82EF036B6F461BCAEC4
-
install_name
win10-updateKB087586-x64.exe
-
log_directory
Temp
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
wininst
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c14-9.dat family_xworm behavioral2/memory/2964-27-0x00000000005E0000-0x0000000000618000-memory.dmp family_xworm -
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral2/memory/1060-34-0x0000000000A00000-0x00000000010A8000-memory.dmp family_quasar behavioral2/memory/1060-35-0x0000000000A00000-0x00000000010A8000-memory.dmp family_quasar behavioral2/memory/1060-47-0x0000000000A00000-0x00000000010A8000-memory.dmp family_quasar behavioral2/memory/3608-49-0x00000000006A0000-0x0000000000D48000-memory.dmp family_quasar behavioral2/memory/3608-48-0x00000000006A0000-0x0000000000D48000-memory.dmp family_quasar -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation vers2.0.0-installx64.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdlu.pif firefox.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdlu.pif firefox.exe -
Executes dropped EXE 3 IoCs
pid Process 2964 firefox.exe 1060 winlogon.exe 3608 win10-updateKB087586-x64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 2348 vers2.0.0-installx64.exe 1060 winlogon.exe 1060 winlogon.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe 3608 win10-updateKB087586-x64.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\firefox.exe vers2.0.0-installx64.exe File opened for modification C:\Program Files (x86)\winlogon.exe vers2.0.0-installx64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vers2.0.0-installx64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win10-updateKB087586-x64.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3164 schtasks.exe 1044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2964 firefox.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2964 firefox.exe Token: SeDebugPrivilege 1060 winlogon.exe Token: SeDebugPrivilege 3608 win10-updateKB087586-x64.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 vers2.0.0-installx64.exe 2348 vers2.0.0-installx64.exe 1060 winlogon.exe 3608 win10-updateKB087586-x64.exe 2964 firefox.exe 3608 win10-updateKB087586-x64.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2964 2348 vers2.0.0-installx64.exe 83 PID 2348 wrote to memory of 2964 2348 vers2.0.0-installx64.exe 83 PID 2348 wrote to memory of 1060 2348 vers2.0.0-installx64.exe 84 PID 2348 wrote to memory of 1060 2348 vers2.0.0-installx64.exe 84 PID 2348 wrote to memory of 1060 2348 vers2.0.0-installx64.exe 84 PID 1060 wrote to memory of 3164 1060 winlogon.exe 85 PID 1060 wrote to memory of 3164 1060 winlogon.exe 85 PID 1060 wrote to memory of 3164 1060 winlogon.exe 85 PID 1060 wrote to memory of 3608 1060 winlogon.exe 87 PID 1060 wrote to memory of 3608 1060 winlogon.exe 87 PID 1060 wrote to memory of 3608 1060 winlogon.exe 87 PID 3608 wrote to memory of 1044 3608 win10-updateKB087586-x64.exe 88 PID 3608 wrote to memory of 1044 3608 win10-updateKB087586-x64.exe 88 PID 3608 wrote to memory of 1044 3608 win10-updateKB087586-x64.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\vers2.0.0-installx64.exe"C:\Users\Admin\AppData\Local\Temp\vers2.0.0-installx64.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\firefox.exe"C:\Program Files (x86)\firefox.exe" 02⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Program Files (x86)\winlogon.exe"C:\Program Files (x86)\winlogon.exe" 02⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\wininst\win10-updateKB087586-x64.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3164
-
-
C:\Users\Admin\AppData\Roaming\wininst\win10-updateKB087586-x64.exe"C:\Users\Admin\AppData\Roaming\wininst\win10-updateKB087586-x64.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\wininst\win10-updateKB087586-x64.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5dda99892c0812b8c3560618c6c80306d
SHA14e758b0ac3b1a59ef7f2487c7bbb05ba06b8a079
SHA25641f95b5d0b1e73157b0b61dc5e946a3e941554e45d7eaaabf96b88cf6634ba4e
SHA512562f474c064227d39058b81b6f36c0d5682c8891c588c6b6dc388a53d3dca20e137ca7a666bcc80955088d91672c9defb77013b636d0cca56239216c113701ef
-
Filesize
2.3MB
MD5626eac3eba8dc885b1c4fd56db614a6e
SHA1ab181653bc3bad16d8cfd5a6d6837c4d6775c68f
SHA2562a2272751fc1dfb43f20cf3bba8b4925e38c972573bb30afd8c77229e8d4bb76
SHA5120eb8fa63aaa99d68fad28d7428f0741313d9496b9b4b99e183a726b596e9c5b1e9f3f594b8ff859975be255881ed63574b6a026500bfb746083949197b5d8747