Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 21:28 UTC
Behavioral task
behavioral1
Sample
fixer for multitool.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fixer for multitool.exe
Resource
win10v2004-20241007-en
General
-
Target
fixer for multitool.exe
-
Size
87KB
-
MD5
99e39146427de4c24dd3f1ff1ed4debe
-
SHA1
c7b51946c52c902c5af7f228613cb00660f15134
-
SHA256
f4c783c56c8cf963890638302a5e92c8e49181b4813f7fa10f2f537ed944ae45
-
SHA512
727a8ae888af56cdf680f163783c554c076451708a3d80c5147af3a10922d6a8edf65c2ec4cfe5552e79317f9be336623e7be4f0fa5ff6a29ed12e08a7fbcc98
-
SSDEEP
1536:imR/EoP7RfUQ3ut4LhZm3BuASk1x9bpcRjkHM3amui1/cZ6DGiOKWP1WlGOOn+P:iW17R87UM3BVx9bpLHMqmuIEYOKWP6GW
Malware Config
Extracted
xworm
blood-pattern.gl.at.ply.gg:24558
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/1084-1-0x00000000001C0000-0x00000000001DC000-memory.dmp family_xworm behavioral1/files/0x00120000000122f3-34.dat family_xworm behavioral1/memory/1208-36-0x0000000000A80000-0x0000000000A9C000-memory.dmp family_xworm behavioral1/memory/2096-39-0x0000000000FC0000-0x0000000000FDC000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2724 powershell.exe 3028 powershell.exe 2964 powershell.exe 2892 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk fixer for multitool.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk fixer for multitool.exe -
Executes dropped EXE 2 IoCs
pid Process 1208 security 2096 security -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\security = "C:\\Users\\Admin\\AppData\\Roaming\\security" fixer for multitool.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2168 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1084 fixer for multitool.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2724 powershell.exe 3028 powershell.exe 2964 powershell.exe 2892 powershell.exe 1084 fixer for multitool.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1084 fixer for multitool.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 1084 fixer for multitool.exe Token: SeDebugPrivilege 1208 security Token: SeDebugPrivilege 2096 security -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1084 fixer for multitool.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2724 1084 fixer for multitool.exe 30 PID 1084 wrote to memory of 2724 1084 fixer for multitool.exe 30 PID 1084 wrote to memory of 2724 1084 fixer for multitool.exe 30 PID 1084 wrote to memory of 3028 1084 fixer for multitool.exe 32 PID 1084 wrote to memory of 3028 1084 fixer for multitool.exe 32 PID 1084 wrote to memory of 3028 1084 fixer for multitool.exe 32 PID 1084 wrote to memory of 2964 1084 fixer for multitool.exe 34 PID 1084 wrote to memory of 2964 1084 fixer for multitool.exe 34 PID 1084 wrote to memory of 2964 1084 fixer for multitool.exe 34 PID 1084 wrote to memory of 2892 1084 fixer for multitool.exe 36 PID 1084 wrote to memory of 2892 1084 fixer for multitool.exe 36 PID 1084 wrote to memory of 2892 1084 fixer for multitool.exe 36 PID 1084 wrote to memory of 2168 1084 fixer for multitool.exe 38 PID 1084 wrote to memory of 2168 1084 fixer for multitool.exe 38 PID 1084 wrote to memory of 2168 1084 fixer for multitool.exe 38 PID 1792 wrote to memory of 1208 1792 taskeng.exe 42 PID 1792 wrote to memory of 1208 1792 taskeng.exe 42 PID 1792 wrote to memory of 1208 1792 taskeng.exe 42 PID 1792 wrote to memory of 2096 1792 taskeng.exe 43 PID 1792 wrote to memory of 2096 1792 taskeng.exe 43 PID 1792 wrote to memory of 2096 1792 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fixer for multitool.exe"C:\Users\Admin\AppData\Local\Temp\fixer for multitool.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\fixer for multitool.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'fixer for multitool.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "security" /tr "C:\Users\Admin\AppData\Roaming\security"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2168
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BCBB7629-FCBD-4847-9A1E-CC0B2138CCC0} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
Network
-
Remote address:8.8.8.8:53Requestapi.telegram.orgIN AResponseapi.telegram.orgIN A149.154.167.220
-
Remote address:8.8.8.8:53Requestblood-pattern.gl.at.ply.ggIN AResponseblood-pattern.gl.at.ply.ggIN A147.185.221.25
-
388 B 219 B 5 5
-
2.5kB 52 B 11 1
-
1.9kB 52 B 9 1
-
1.9kB 52 B 9 1
-
1.9kB 52 B 9 1
-
1.9kB 52 B 9 1
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57bf36c219c6a4681e1cd24edb0abf9dc
SHA169524563a5505bee505c26529eff7cd68a0f277a
SHA256270a67e99bdb1cbf2cbd605b540da90e6556f853f04651228de62222a779c7d5
SHA512a538a78889778d7ea1c3685ac64c53f30c5a4da57ea3caa9fb95d8437817b4e3095cc9e18e9f51f4597e7062f9ac8cca665ab6d14aadf487eac3046f25219447
-
Filesize
87KB
MD599e39146427de4c24dd3f1ff1ed4debe
SHA1c7b51946c52c902c5af7f228613cb00660f15134
SHA256f4c783c56c8cf963890638302a5e92c8e49181b4813f7fa10f2f537ed944ae45
SHA512727a8ae888af56cdf680f163783c554c076451708a3d80c5147af3a10922d6a8edf65c2ec4cfe5552e79317f9be336623e7be4f0fa5ff6a29ed12e08a7fbcc98