Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 16:54
Static task
static1
Behavioral task
behavioral1
Sample
vson I temp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vson I temp.exe
Resource
win10v2004-20241007-en
General
-
Target
vson I temp.exe
-
Size
15.6MB
-
MD5
328e91dbd965eb1f0902080bc81df413
-
SHA1
7a049c89f8fd79f0b91e12bdff17affd2066e403
-
SHA256
11ea437ffb781fc9b93a6dfda275736ee591c14dfb860aa165a357974e90a352
-
SHA512
1e7e40e54db78ac7d78eccf98d6c34a6f70c29639c010c8512ffa56f06755bc445c161d990913ca2299ae3602f474b4aa0b34fd5fd728f9a473745aeacb4ce3e
-
SSDEEP
393216:nTvw6H8s1QzwNUJVtoMATyVchl49o1SrBqqxSlUa+PMsw6E3sSwr0DN:nJcJwCJEM7Vcf49LwUa+PDEsP0N
Malware Config
Extracted
xworm
45.88.91.79:1111
-
Install_directory
%AppData%
-
install_file
Update.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x00070000000174b4-24.dat family_xworm behavioral1/memory/2676-27-0x00000000002D0000-0x00000000002EA000-memory.dmp family_xworm behavioral1/memory/876-44-0x0000000001100000-0x000000000111A000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk spoofer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk spoofer.exe -
Executes dropped EXE 5 IoCs
pid Process 2764 svxspoofer.exe 2720 temp.exe 2676 spoofer.exe 876 Update.exe 2296 Update.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 vson I temp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\Update.exe" spoofer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 powershell.exe 2676 spoofer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2676 spoofer.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 2676 spoofer.exe Token: SeDebugPrivilege 876 Update.exe Token: SeDebugPrivilege 2296 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2676 spoofer.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2764 2280 vson I temp.exe 31 PID 2280 wrote to memory of 2764 2280 vson I temp.exe 31 PID 2280 wrote to memory of 2764 2280 vson I temp.exe 31 PID 2280 wrote to memory of 2720 2280 vson I temp.exe 32 PID 2280 wrote to memory of 2720 2280 vson I temp.exe 32 PID 2280 wrote to memory of 2720 2280 vson I temp.exe 32 PID 2764 wrote to memory of 532 2764 svxspoofer.exe 33 PID 2764 wrote to memory of 532 2764 svxspoofer.exe 33 PID 2764 wrote to memory of 532 2764 svxspoofer.exe 33 PID 2764 wrote to memory of 2676 2764 svxspoofer.exe 35 PID 2764 wrote to memory of 2676 2764 svxspoofer.exe 35 PID 2764 wrote to memory of 2676 2764 svxspoofer.exe 35 PID 532 wrote to memory of 1424 532 cmd.exe 36 PID 532 wrote to memory of 1424 532 cmd.exe 36 PID 532 wrote to memory of 1424 532 cmd.exe 36 PID 1424 wrote to memory of 2856 1424 powershell.exe 38 PID 1424 wrote to memory of 2856 1424 powershell.exe 38 PID 1424 wrote to memory of 2856 1424 powershell.exe 38 PID 2676 wrote to memory of 2940 2676 spoofer.exe 39 PID 2676 wrote to memory of 2940 2676 spoofer.exe 39 PID 2676 wrote to memory of 2940 2676 spoofer.exe 39 PID 2444 wrote to memory of 876 2444 taskeng.exe 42 PID 2444 wrote to memory of 876 2444 taskeng.exe 42 PID 2444 wrote to memory of 876 2444 taskeng.exe 42 PID 2444 wrote to memory of 2296 2444 taskeng.exe 43 PID 2444 wrote to memory of 2296 2444 taskeng.exe 43 PID 2444 wrote to memory of 2296 2444 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\vson I temp.exe"C:\Users\Admin\AppData\Local\Temp\vson I temp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\svxspoofer.exe"C:\Users\Admin\AppData\Roaming\svxspoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Loli1.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\findstr.exe"C:\Windows\system32\findstr.exe" /i WDS100T2B0A5⤵PID:2856
-
-
-
-
C:\Users\Admin\AppData\Roaming\spoofer.exe"C:\Users\Admin\AppData\Roaming\spoofer.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Update" /tr "C:\Users\Admin\AppData\Roaming\Update.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
-
-
C:\Users\Admin\AppData\Roaming\temp.exe"C:\Users\Admin\AppData\Roaming\temp.exe"2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {237370B5-AFA8-4595-8A9F-4AA0C0BC7204} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\Update.exeC:\Users\Admin\AppData\Roaming\Update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Users\Admin\AppData\Roaming\Update.exeC:\Users\Admin\AppData\Roaming\Update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD5fc0c7ac2031e2d8602581e1944d0ec03
SHA1b326ca0ec216566a91563cf6d4eebe874a19c98a
SHA256dd9f52ed7849f3c51b3945b0f80e21f3171dde9a42e2d9fb9167a40f1f303a82
SHA5128992fe3cb717fc88994ff438dec8a843fc0765da9b0342da80adbf56099f95aa815fa134c8215477753a02de437db5242e3a10098caeefb3d26534103e4f5c49
-
Filesize
76KB
MD55f9520202e5e423920b9448aa0606202
SHA16731e2a1f86c1d1d3fa2f1a166ca5769f6448b75
SHA256505e9abc61128bb34b33d1e9ad3f707822da952ea8bbd830292355e292e2953c
SHA512c6413ae3b492ce874cfa30a320ce91368c8950bdc2e84d4b44d81e4246fd55d3f6ce9e069f42fd78f58dd401e90b79ba4c7bd6728d4d009a7ea3a610c23258a6
-
Filesize
8.0MB
MD525f5e0ff148fd515e321e303e85bb26d
SHA1244e7d628183aa578a77fafe89f473f56b64a60e
SHA25661b4a5fa314642743ee91fdd25ab762723216c165d7df5ffeec4e99708f76d6b
SHA512037c7bc402ec364928664c71be7b7a5b8f3302fa069da3da141b24c7e14bac8adaa8cf5e8d287f571dc7d5509098ef262aec67076c5fbc39dbc5aecc7511976a
-
Filesize
7.6MB
MD5c5c7253e68ea5d96ad86b7a99c465386
SHA11f6197326f53c231929f90b01d0afae65ae75c6d
SHA256c38ce83359b11c63b187f1fe5d3c3a8ef2eac3377d67eada3299758f24d33cc5
SHA512bf4221643f50ea2b9a3fd84e7c49219178f4e6d63b8f9e6505b512277534df945d7f0527d793981e37440abffdd78d93d04ac6a69532a64dea94a4e7e54355c9