Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 05:15
Behavioral task
behavioral1
Sample
555.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
555.exe
Resource
win10v2004-20241007-en
General
-
Target
555.exe
-
Size
73KB
-
MD5
a419ffb32ad6422938129688d39a898f
-
SHA1
303695e2f43566685c568ca670133b0d717eabcf
-
SHA256
96d7f2474c300d7f24cd2635f03d52fe40964a030787d9e84dd1fedbb5618691
-
SHA512
6a145de4ee6d26b1ee8be5cc22f7888291b8544ea8323f425da8ecfafdf79d961164ddd3c3eaf5a5d7abaa6208e5539c2ea8d2685440e81c6eea2248f8552e9f
-
SSDEEP
1536:v2oktWbR7i2wiOXObYzDVSUbLUSsr36xOwGZtadQAa:v2ocs7iaOebHUbLGcOwGCdfa
Malware Config
Extracted
xworm
house-jungle.gl.at.ply.gg:14868
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2688-1-0x00000000012E0000-0x00000000012F8000-memory.dmp family_xworm behavioral1/files/0x0006000000004ed7-33.dat family_xworm behavioral1/memory/1496-35-0x0000000001210000-0x0000000001228000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2568 powershell.exe 2592 powershell.exe 828 powershell.exe 2924 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bar2lecb.lnk 555.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bar2lecb.lnk 555.exe -
Executes dropped EXE 2 IoCs
pid Process 1496 Bar2lecb 1720 Bar2lecb -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bar2lecb = "C:\\Users\\Admin\\Bar2lecb" 555.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2568 powershell.exe 2592 powershell.exe 828 powershell.exe 2924 powershell.exe 2688 555.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2688 555.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2688 555.exe Token: SeDebugPrivilege 1496 Bar2lecb Token: SeDebugPrivilege 1720 Bar2lecb -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 555.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2568 2688 555.exe 32 PID 2688 wrote to memory of 2568 2688 555.exe 32 PID 2688 wrote to memory of 2568 2688 555.exe 32 PID 2688 wrote to memory of 2592 2688 555.exe 34 PID 2688 wrote to memory of 2592 2688 555.exe 34 PID 2688 wrote to memory of 2592 2688 555.exe 34 PID 2688 wrote to memory of 828 2688 555.exe 36 PID 2688 wrote to memory of 828 2688 555.exe 36 PID 2688 wrote to memory of 828 2688 555.exe 36 PID 2688 wrote to memory of 2924 2688 555.exe 38 PID 2688 wrote to memory of 2924 2688 555.exe 38 PID 2688 wrote to memory of 2924 2688 555.exe 38 PID 2688 wrote to memory of 2728 2688 555.exe 40 PID 2688 wrote to memory of 2728 2688 555.exe 40 PID 2688 wrote to memory of 2728 2688 555.exe 40 PID 1488 wrote to memory of 1496 1488 taskeng.exe 43 PID 1488 wrote to memory of 1496 1488 taskeng.exe 43 PID 1488 wrote to memory of 1496 1488 taskeng.exe 43 PID 1488 wrote to memory of 1720 1488 taskeng.exe 44 PID 1488 wrote to memory of 1720 1488 taskeng.exe 44 PID 1488 wrote to memory of 1720 1488 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\555.exe"C:\Users\Admin\AppData\Local\Temp\555.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\555.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '555.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Bar2lecb'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Bar2lecb'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Bar2lecb" /tr "C:\Users\Admin\Bar2lecb"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FEBA5E8-3A4C-43FC-A8D4-01DF4CA2515E} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\Bar2lecbC:\Users\Admin\Bar2lecb2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\Bar2lecbC:\Users\Admin\Bar2lecb2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58146f88c2277ddd27d475c7bf3aa6127
SHA1b9356b93e1f90bfa5396b146c7e226d3cd9a1d78
SHA25643569a5673831478c2d463cc418d0f6061b9e40822470d1d0c627bc3453ae620
SHA512961ba77d92f165af291af1ee21399110925b106f83af6baf848370a2ec0a642596be17e8b87c6069a7b0c022b36c645ed76c7a283aa9421d8df019c25449bedf
-
Filesize
73KB
MD5a419ffb32ad6422938129688d39a898f
SHA1303695e2f43566685c568ca670133b0d717eabcf
SHA25696d7f2474c300d7f24cd2635f03d52fe40964a030787d9e84dd1fedbb5618691
SHA5126a145de4ee6d26b1ee8be5cc22f7888291b8544ea8323f425da8ecfafdf79d961164ddd3c3eaf5a5d7abaa6208e5539c2ea8d2685440e81c6eea2248f8552e9f