Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 04:13
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20241007-en
General
-
Target
svchost.exe
-
Size
74KB
-
MD5
31fc055df1031a064f93fb32fedb1102
-
SHA1
bd7c77edba60504dd17085eb99f9486185a59925
-
SHA256
9dc9b2e78ea2fb6b99b8366123315d73f6097abc59514a5456da61b4dbbe9ecc
-
SHA512
baf46d849c32c2399d169e508a2fb5fd0e38c22ce0b3d85a1f62520dfd4335cbae5b42002d9a0b5f1b7e496a3cc7c02474eccd1a4475cafb3f55706cbe330daa
-
SSDEEP
1536:8LgUO5QAWo3oV0sZW3aE3i3kb4a7Saxu6hxOAKSc8f4Q:8LgfGcoVo33bbNnxLOLSc8gQ
Malware Config
Extracted
xworm
127.0.0.1:55299
road-stars.gl.at.ply.gg:55299
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2760-1-0x0000000000B10000-0x0000000000B28000-memory.dmp family_xworm behavioral1/files/0x000c00000001202c-37.dat family_xworm behavioral1/memory/2200-39-0x00000000002B0000-0x00000000002C8000-memory.dmp family_xworm behavioral1/memory/1876-41-0x0000000000AB0000-0x0000000000AC8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 660 powershell.exe 1624 powershell.exe 2748 powershell.exe 2488 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2200 svchost.exe 1876 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\svchost.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2748 powershell.exe 2488 powershell.exe 660 powershell.exe 1624 powershell.exe 2760 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2760 svchost.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2760 svchost.exe Token: SeDebugPrivilege 2200 svchost.exe Token: SeDebugPrivilege 1876 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2748 2760 svchost.exe 31 PID 2760 wrote to memory of 2748 2760 svchost.exe 31 PID 2760 wrote to memory of 2748 2760 svchost.exe 31 PID 2760 wrote to memory of 2488 2760 svchost.exe 33 PID 2760 wrote to memory of 2488 2760 svchost.exe 33 PID 2760 wrote to memory of 2488 2760 svchost.exe 33 PID 2760 wrote to memory of 660 2760 svchost.exe 35 PID 2760 wrote to memory of 660 2760 svchost.exe 35 PID 2760 wrote to memory of 660 2760 svchost.exe 35 PID 2760 wrote to memory of 1624 2760 svchost.exe 37 PID 2760 wrote to memory of 1624 2760 svchost.exe 37 PID 2760 wrote to memory of 1624 2760 svchost.exe 37 PID 2760 wrote to memory of 2868 2760 svchost.exe 39 PID 2760 wrote to memory of 2868 2760 svchost.exe 39 PID 2760 wrote to memory of 2868 2760 svchost.exe 39 PID 2092 wrote to memory of 2200 2092 taskeng.exe 43 PID 2092 wrote to memory of 2200 2092 taskeng.exe 43 PID 2092 wrote to memory of 2200 2092 taskeng.exe 43 PID 2092 wrote to memory of 1876 2092 taskeng.exe 44 PID 2092 wrote to memory of 1876 2092 taskeng.exe 44 PID 2092 wrote to memory of 1876 2092 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {21960E7B-4863-4D6B-B7BB-7F8C585DBEBC} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\svchost.exeC:\Users\Admin\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\svchost.exeC:\Users\Admin\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57df2ebfa0f595a613a41cb5e8484c6a3
SHA1348bfc8af3d1788f2cf41a10a592adfdf4cbdb38
SHA2565cc921a28bdf2cd896a5cf020ba4fcf3d32443936085e05614af15f787ff259d
SHA5122cf6dd1d90e051d609139951885ca0c672d016b8fe5618785ae390c54f6a1fb48afb373e26a5e887f3ecf3a587939108a96537ef79830fa0d67bd59c22869470
-
Filesize
74KB
MD531fc055df1031a064f93fb32fedb1102
SHA1bd7c77edba60504dd17085eb99f9486185a59925
SHA2569dc9b2e78ea2fb6b99b8366123315d73f6097abc59514a5456da61b4dbbe9ecc
SHA512baf46d849c32c2399d169e508a2fb5fd0e38c22ce0b3d85a1f62520dfd4335cbae5b42002d9a0b5f1b7e496a3cc7c02474eccd1a4475cafb3f55706cbe330daa