Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
Spoofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Spoofer.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Spoofer.exe
-
Size
90KB
-
MD5
cb8398c640f85445d6e14a2e325eb826
-
SHA1
2e888003ab1bda0e17297361901be57fbc746e4e
-
SHA256
4414027d7369fa5b62c6cff9836dc792389c085defc5cba782793159e81036b1
-
SHA512
268d3bace276b09e15f089e5e19b0181c3060c2965f1d24a2355123bfff8d0f274051c24132040002a0abf727f259756fecebc858050eeaa5445525a7d9d4833
-
SSDEEP
1536:5jx25uS8KkpHTe9yivqHLrZ+UGpCr8lFo4XwCjAaBhlPrTAdxJ2MT6UaIPxnLxHY:51KuNrpH21CHLt9GMCbHlPXAhEU3xZ6z
Malware Config
Extracted
xworm
trip-thesaurus.gl.at.ply.gg:16715
-
Install_directory
%AppData%
-
install_file
SecurityHealthSystray.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120fd-2.dat family_xworm behavioral1/memory/2192-8-0x0000000000140000-0x000000000015C000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1052 powershell.exe 2352 powershell.exe 2908 powershell.exe 2616 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk Woofer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk Woofer.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 Woofer.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 Spoofer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthSystray.exe" Woofer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2192 Woofer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2700 powershell.exe 2616 powershell.exe 1052 powershell.exe 2352 powershell.exe 2908 powershell.exe 2192 Woofer.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2192 Woofer.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2192 Woofer.exe Token: SeShutdownPrivilege 1676 shutdown.exe Token: SeRemoteShutdownPrivilege 1676 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2192 Woofer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2700 2324 Spoofer.exe 29 PID 2324 wrote to memory of 2700 2324 Spoofer.exe 29 PID 2324 wrote to memory of 2700 2324 Spoofer.exe 29 PID 2324 wrote to memory of 2700 2324 Spoofer.exe 29 PID 2324 wrote to memory of 2192 2324 Spoofer.exe 31 PID 2324 wrote to memory of 2192 2324 Spoofer.exe 31 PID 2324 wrote to memory of 2192 2324 Spoofer.exe 31 PID 2324 wrote to memory of 2192 2324 Spoofer.exe 31 PID 2192 wrote to memory of 2616 2192 Woofer.exe 33 PID 2192 wrote to memory of 2616 2192 Woofer.exe 33 PID 2192 wrote to memory of 2616 2192 Woofer.exe 33 PID 2192 wrote to memory of 1052 2192 Woofer.exe 35 PID 2192 wrote to memory of 1052 2192 Woofer.exe 35 PID 2192 wrote to memory of 1052 2192 Woofer.exe 35 PID 2192 wrote to memory of 2352 2192 Woofer.exe 37 PID 2192 wrote to memory of 2352 2192 Woofer.exe 37 PID 2192 wrote to memory of 2352 2192 Woofer.exe 37 PID 2192 wrote to memory of 2908 2192 Woofer.exe 39 PID 2192 wrote to memory of 2908 2192 Woofer.exe 39 PID 2192 wrote to memory of 2908 2192 Woofer.exe 39 PID 2192 wrote to memory of 2868 2192 Woofer.exe 41 PID 2192 wrote to memory of 2868 2192 Woofer.exe 41 PID 2192 wrote to memory of 2868 2192 Woofer.exe 41 PID 2192 wrote to memory of 1676 2192 Woofer.exe 43 PID 2192 wrote to memory of 1676 2192 Woofer.exe 43 PID 2192 wrote to memory of 1676 2192 Woofer.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Spoofer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAYgBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAawBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAdgB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAdQBnACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\Woofer.exe"C:\Users\Admin\AppData\Roaming\Woofer.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Woofer.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Woofer.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1BE675I1CNW9OUVCPS58.temp
Filesize7KB
MD5dc7d277728379d7fa27239ef32fcadf0
SHA187ee36c1b1f6d25c67e4e2712f3dc92693deda56
SHA2564cfebb854db8c6f13a6e0d689e2b5b128ca8e3d97b5d5b8c62d65189c1b69521
SHA512ac58609df389252c1d0fe57c3516304ee9996d64fd92c8abdeb6880408667aed617370642ee4627ead82d2e35f583fe34aef0381d5d695becdbf6ee969bf93fe
-
Filesize
84KB
MD5401884996ecf50f3c44e4bc55e228b3c
SHA18eec44a33a180a8ea816f1d07d40c396dfa243d0
SHA256602eb973f30d7c9533eb827f3731b057e17271bcc7617c1526c9909b71baa683
SHA512ea8b57b10ad3c569e2456c0cfedaada977db6f8dd768e15800e3af535b68299e66e3f77df613ee3a30a8bcd68a8deff315f5531ac6a40135de0a0126a28e6d08