Overview
overview
10Static
static
5temp/temp/...er.bat
windows7-x64
1temp/temp/...er.bat
windows10-2004-x64
1temp/temp/...er.bat
windows7-x64
1temp/temp/...er.bat
windows10-2004-x64
1temp/temp/...ht.bat
windows7-x64
8temp/temp/...ht.bat
windows10-2004-x64
8temp/temp/...er.exe
windows7-x64
1temp/temp/...er.exe
windows10-2004-x64
1temp/temp/...er.exe
windows7-x64
1temp/temp/...er.exe
windows10-2004-x64
1temp/temp/...gs.vbs
windows7-x64
3temp/temp/...gs.vbs
windows10-2004-x64
1temp/temp/...ol.exe
windows7-x64
10temp/temp/...ol.exe
windows10-2004-x64
5temp/temp/...64.dll
windows7-x64
1temp/temp/...64.dll
windows10-2004-x64
1temp/temp/...64.dll
windows7-x64
1temp/temp/...64.dll
windows10-2004-x64
1temp/temp/...mp.exe
windows7-x64
10temp/temp/...mp.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 16:56
Behavioral task
behavioral1
Sample
temp/temp/temp/temp/Serial Checker.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
temp/temp/temp/temp/Serial Checker.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
temp/temp/temp/temp/cleaners/FortniteCleaner.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
temp/temp/temp/temp/cleaners/FortniteCleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
temp/temp/temp/temp/cleaners/Midnight.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
temp/temp/temp/temp/cleaners/Midnight.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
temp/temp/temp/temp/cleaners/Toruney_Cleaner.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
temp/temp/temp/temp/cleaners/Toruney_Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
temp/temp/temp/temp/cleaners/cleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
temp/temp/temp/temp/cleaners/cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
temp/temp/temp/temp/d control need/Defender_Settings.vbs
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
temp/temp/temp/temp/d control need/Defender_Settings.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
temp/temp/temp/temp/d control need/dControl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
temp/temp/temp/temp/d control need/dControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
temp/temp/temp/temp/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
temp/temp/temp/temp/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
temp/temp/temp/temp/libssl-3-x64.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
temp/temp/temp/temp/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
temp/temp/temp/temp/vson I temp.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
temp/temp/temp/temp/vson I temp.exe
Resource
win10v2004-20241007-en
General
-
Target
temp/temp/temp/temp/vson I temp.exe
-
Size
15.6MB
-
MD5
328e91dbd965eb1f0902080bc81df413
-
SHA1
7a049c89f8fd79f0b91e12bdff17affd2066e403
-
SHA256
11ea437ffb781fc9b93a6dfda275736ee591c14dfb860aa165a357974e90a352
-
SHA512
1e7e40e54db78ac7d78eccf98d6c34a6f70c29639c010c8512ffa56f06755bc445c161d990913ca2299ae3602f474b4aa0b34fd5fd728f9a473745aeacb4ce3e
-
SSDEEP
393216:nTvw6H8s1QzwNUJVtoMATyVchl49o1SrBqqxSlUa+PMsw6E3sSwr0DN:nJcJwCJEM7Vcf49LwUa+PDEsP0N
Malware Config
Extracted
xworm
45.88.91.79:1111
-
Install_directory
%AppData%
-
install_file
Update.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral19/files/0x0006000000016d22-26.dat family_xworm behavioral19/memory/2732-27-0x0000000000830000-0x000000000084A000-memory.dmp family_xworm behavioral19/memory/2964-43-0x00000000001A0000-0x00000000001BA000-memory.dmp family_xworm behavioral19/memory/2976-46-0x00000000010A0000-0x00000000010BA000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk spoofer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk spoofer.exe -
Executes dropped EXE 5 IoCs
pid Process 2900 svxspoofer.exe 340 temp.exe 2732 spoofer.exe 2964 Update.exe 2976 Update.exe -
Loads dropped DLL 1 IoCs
pid Process 276 vson I temp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\Update.exe" spoofer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 powershell.exe 2732 spoofer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2732 spoofer.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2732 spoofer.exe Token: SeDebugPrivilege 2964 Update.exe Token: SeDebugPrivilege 2976 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 spoofer.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 276 wrote to memory of 2900 276 vson I temp.exe 30 PID 276 wrote to memory of 2900 276 vson I temp.exe 30 PID 276 wrote to memory of 2900 276 vson I temp.exe 30 PID 276 wrote to memory of 340 276 vson I temp.exe 31 PID 276 wrote to memory of 340 276 vson I temp.exe 31 PID 276 wrote to memory of 340 276 vson I temp.exe 31 PID 2900 wrote to memory of 3004 2900 svxspoofer.exe 32 PID 2900 wrote to memory of 3004 2900 svxspoofer.exe 32 PID 2900 wrote to memory of 3004 2900 svxspoofer.exe 32 PID 2900 wrote to memory of 2732 2900 svxspoofer.exe 33 PID 2900 wrote to memory of 2732 2900 svxspoofer.exe 33 PID 2900 wrote to memory of 2732 2900 svxspoofer.exe 33 PID 3004 wrote to memory of 2736 3004 cmd.exe 35 PID 3004 wrote to memory of 2736 3004 cmd.exe 35 PID 3004 wrote to memory of 2736 3004 cmd.exe 35 PID 2736 wrote to memory of 536 2736 powershell.exe 37 PID 2736 wrote to memory of 536 2736 powershell.exe 37 PID 2736 wrote to memory of 536 2736 powershell.exe 37 PID 2732 wrote to memory of 2820 2732 spoofer.exe 38 PID 2732 wrote to memory of 2820 2732 spoofer.exe 38 PID 2732 wrote to memory of 2820 2732 spoofer.exe 38 PID 2092 wrote to memory of 2964 2092 taskeng.exe 42 PID 2092 wrote to memory of 2964 2092 taskeng.exe 42 PID 2092 wrote to memory of 2964 2092 taskeng.exe 42 PID 2092 wrote to memory of 2976 2092 taskeng.exe 43 PID 2092 wrote to memory of 2976 2092 taskeng.exe 43 PID 2092 wrote to memory of 2976 2092 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\temp\temp\temp\temp\vson I temp.exe"C:\Users\Admin\AppData\Local\Temp\temp\temp\temp\temp\vson I temp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Roaming\svxspoofer.exe"C:\Users\Admin\AppData\Roaming\svxspoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Loli1.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\findstr.exe"C:\Windows\system32\findstr.exe" /i WDS100T2B0A5⤵PID:536
-
-
-
-
C:\Users\Admin\AppData\Roaming\spoofer.exe"C:\Users\Admin\AppData\Roaming\spoofer.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Update" /tr "C:\Users\Admin\AppData\Roaming\Update.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
-
-
C:\Users\Admin\AppData\Roaming\temp.exe"C:\Users\Admin\AppData\Roaming\temp.exe"2⤵
- Executes dropped EXE
PID:340
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {654139B3-7BAB-4DFE-9012-29A67210455F} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\Update.exeC:\Users\Admin\AppData\Roaming\Update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\AppData\Roaming\Update.exeC:\Users\Admin\AppData\Roaming\Update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD5fc0c7ac2031e2d8602581e1944d0ec03
SHA1b326ca0ec216566a91563cf6d4eebe874a19c98a
SHA256dd9f52ed7849f3c51b3945b0f80e21f3171dde9a42e2d9fb9167a40f1f303a82
SHA5128992fe3cb717fc88994ff438dec8a843fc0765da9b0342da80adbf56099f95aa815fa134c8215477753a02de437db5242e3a10098caeefb3d26534103e4f5c49
-
Filesize
76KB
MD55f9520202e5e423920b9448aa0606202
SHA16731e2a1f86c1d1d3fa2f1a166ca5769f6448b75
SHA256505e9abc61128bb34b33d1e9ad3f707822da952ea8bbd830292355e292e2953c
SHA512c6413ae3b492ce874cfa30a320ce91368c8950bdc2e84d4b44d81e4246fd55d3f6ce9e069f42fd78f58dd401e90b79ba4c7bd6728d4d009a7ea3a610c23258a6
-
Filesize
8.0MB
MD525f5e0ff148fd515e321e303e85bb26d
SHA1244e7d628183aa578a77fafe89f473f56b64a60e
SHA25661b4a5fa314642743ee91fdd25ab762723216c165d7df5ffeec4e99708f76d6b
SHA512037c7bc402ec364928664c71be7b7a5b8f3302fa069da3da141b24c7e14bac8adaa8cf5e8d287f571dc7d5509098ef262aec67076c5fbc39dbc5aecc7511976a
-
Filesize
7.6MB
MD5c5c7253e68ea5d96ad86b7a99c465386
SHA11f6197326f53c231929f90b01d0afae65ae75c6d
SHA256c38ce83359b11c63b187f1fe5d3c3a8ef2eac3377d67eada3299758f24d33cc5
SHA512bf4221643f50ea2b9a3fd84e7c49219178f4e6d63b8f9e6505b512277534df945d7f0527d793981e37440abffdd78d93d04ac6a69532a64dea94a4e7e54355c9