Analysis

  • max time kernel
    21s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 15:53 UTC

Errors

Reason
Machine shutdown

General

  • Target

    Nezur_Internal.exe

  • Size

    1.3MB

  • MD5

    c8e3253dfa6d5a21b87950dd7eb2c652

  • SHA1

    c0d8849408efd3b42e07b8f43ecb2979158c9c0f

  • SHA256

    b8d5ab8adf0da37f5fcd09e09d3bab66458f4cd6fefc5760daa8c247fd55eb76

  • SHA512

    efa4cc3ccaa797c9f9c64c4aa6f4f0aa995d3e36bfe0563b7ffce0978ff880bc4fa913c363fbf7792fe552753098e870642b35602cf8625938e9ff84a1d376d9

  • SSDEEP

    24576:cUTaQIolipFeyKvY4JMdA9MpBO++aBIbH1CAB1v:caIowzeth9KIbHhBp

Score
10/10

Malware Config

Extracted

Family

xworm

C2

drive-mens.gl.at.ply.gg:20498

Attributes
  • Install_directory

    %AppData%

  • install_file

    SystemUser.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nezur_Internal.exe
    "C:\Users\Admin\AppData\Local\Temp\Nezur_Internal.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Roaming\wyvernunbanner.exe
      "C:\Users\Admin\AppData\Roaming\wyvernunbanner.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\system32\shutdown.exe
        shutdown.exe /f /s /t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2732
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1616

      Network

      • flag-us
        DNS
        drive-mens.gl.at.ply.gg
        wyvernunbanner.exe
        Remote address:
        8.8.8.8:53
        Request
        drive-mens.gl.at.ply.gg
        IN A
        Response
        drive-mens.gl.at.ply.gg
        IN A
        147.185.221.25
      • 147.185.221.25:20498
        drive-mens.gl.at.ply.gg
        wyvernunbanner.exe
        574 B
        250 B
        6
        5
      • 8.8.8.8:53
        drive-mens.gl.at.ply.gg
        dns
        wyvernunbanner.exe
        69 B
        85 B
        1
        1

        DNS Request

        drive-mens.gl.at.ply.gg

        DNS Response

        147.185.221.25

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\wyvernunbanner.exe

        Filesize

        41KB

        MD5

        8c0ead2cbe490984b478ec5f694d187c

        SHA1

        7c2ad7cbeb7722825421cdf457a00259cbd2c177

        SHA256

        a0150c4e756d7df71931fb9661be086354b36bf654aaa6acc2d51e5ff0da9c25

        SHA512

        4a0dfd3b984185af61c1502c1894a73738e16ea841c3b877d2ebc5d7bc302b8dbecdbf9b3fc78f2ebdced4e32360c9fde7dfff964ec1701c6627639b8b231d78

      • memory/1668-8-0x0000000000EB0000-0x0000000000EC0000-memory.dmp

        Filesize

        64KB

      • memory/1668-11-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

        Filesize

        9.9MB

      • memory/1668-16-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

        Filesize

        9.9MB

      • memory/1668-17-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

        Filesize

        9.9MB

      • memory/1668-18-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

        Filesize

        9.9MB

      • memory/1668-19-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

        Filesize

        9.9MB

      • memory/2344-0-0x000007FEF5A93000-0x000007FEF5A94000-memory.dmp

        Filesize

        4KB

      • memory/2344-1-0x0000000001050000-0x00000000011A6000-memory.dmp

        Filesize

        1.3MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.