Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER TEU (NT250214).exe
Resource
win7-20240729-en
General
-
Target
NEW ORDER TEU (NT250214).exe
-
Size
581KB
-
MD5
3c3b62520e40870390b33f528a8f7619
-
SHA1
c65f1ca358fcfbce3c1466bc47f3ed89c5d6d42a
-
SHA256
a2f9f0e73da837b578ef0b58a3bec4795920201b81d82cdb873e3a5198bddb96
-
SHA512
885aa492e0758099db0b631a3aa214a1cd81f42ffcd900b45293ea9a02fffd412b3fc2eb6579423a911335295d1726102b2381e4ce274e429f9193156de255a8
-
SSDEEP
12288:n5t6WhRSUunDYbDI13hVE+z5fOsQneDOYoPo4RNEnOef58U/isUkR:P6NnDMDIN5IwfnB7isT
Malware Config
Extracted
xworm
5.0
dorismark81.duckdns.org:28503
j2oLPi6pecBOp0er
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2848-28-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2848-25-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2848-23-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2848-30-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2848-29-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1584 powershell.exe 2572 powershell.exe 1960 powershell.exe 2824 powershell.exe 2172 powershell.exe 2872 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk NEW ORDER TEU (NT250214).exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk NEW ORDER TEU (NT250214).exe -
Loads dropped DLL 1 IoCs
pid Process 2848 NEW ORDER TEU (NT250214).exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2848 2088 NEW ORDER TEU (NT250214).exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW ORDER TEU (NT250214).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW ORDER TEU (NT250214).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2088 NEW ORDER TEU (NT250214).exe 2088 NEW ORDER TEU (NT250214).exe 2572 powershell.exe 1584 powershell.exe 1960 powershell.exe 2824 powershell.exe 2172 powershell.exe 2872 powershell.exe 2848 NEW ORDER TEU (NT250214).exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2088 NEW ORDER TEU (NT250214).exe Token: SeDebugPrivilege 2848 NEW ORDER TEU (NT250214).exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 NEW ORDER TEU (NT250214).exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1584 2088 NEW ORDER TEU (NT250214).exe 30 PID 2088 wrote to memory of 1584 2088 NEW ORDER TEU (NT250214).exe 30 PID 2088 wrote to memory of 1584 2088 NEW ORDER TEU (NT250214).exe 30 PID 2088 wrote to memory of 1584 2088 NEW ORDER TEU (NT250214).exe 30 PID 2088 wrote to memory of 2572 2088 NEW ORDER TEU (NT250214).exe 32 PID 2088 wrote to memory of 2572 2088 NEW ORDER TEU (NT250214).exe 32 PID 2088 wrote to memory of 2572 2088 NEW ORDER TEU (NT250214).exe 32 PID 2088 wrote to memory of 2572 2088 NEW ORDER TEU (NT250214).exe 32 PID 2088 wrote to memory of 2728 2088 NEW ORDER TEU (NT250214).exe 33 PID 2088 wrote to memory of 2728 2088 NEW ORDER TEU (NT250214).exe 33 PID 2088 wrote to memory of 2728 2088 NEW ORDER TEU (NT250214).exe 33 PID 2088 wrote to memory of 2728 2088 NEW ORDER TEU (NT250214).exe 33 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2088 wrote to memory of 2848 2088 NEW ORDER TEU (NT250214).exe 36 PID 2848 wrote to memory of 1960 2848 NEW ORDER TEU (NT250214).exe 37 PID 2848 wrote to memory of 1960 2848 NEW ORDER TEU (NT250214).exe 37 PID 2848 wrote to memory of 1960 2848 NEW ORDER TEU (NT250214).exe 37 PID 2848 wrote to memory of 1960 2848 NEW ORDER TEU (NT250214).exe 37 PID 2848 wrote to memory of 2824 2848 NEW ORDER TEU (NT250214).exe 39 PID 2848 wrote to memory of 2824 2848 NEW ORDER TEU (NT250214).exe 39 PID 2848 wrote to memory of 2824 2848 NEW ORDER TEU (NT250214).exe 39 PID 2848 wrote to memory of 2824 2848 NEW ORDER TEU (NT250214).exe 39 PID 2848 wrote to memory of 2172 2848 NEW ORDER TEU (NT250214).exe 41 PID 2848 wrote to memory of 2172 2848 NEW ORDER TEU (NT250214).exe 41 PID 2848 wrote to memory of 2172 2848 NEW ORDER TEU (NT250214).exe 41 PID 2848 wrote to memory of 2172 2848 NEW ORDER TEU (NT250214).exe 41 PID 2848 wrote to memory of 2872 2848 NEW ORDER TEU (NT250214).exe 43 PID 2848 wrote to memory of 2872 2848 NEW ORDER TEU (NT250214).exe 43 PID 2848 wrote to memory of 2872 2848 NEW ORDER TEU (NT250214).exe 43 PID 2848 wrote to memory of 2872 2848 NEW ORDER TEU (NT250214).exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GVOdDLzPcCam.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GVOdDLzPcCam" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7CCE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe"2⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\NEW ORDER TEU (NT250214).exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NEW ORDER TEU (NT250214).exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2837d468f46943c3833c2e264e88146
SHA13ad6d64508e7b38a4823cb328334a373b5e8748d
SHA2561622211f48803e6fc8e7c9dd55be6b642693c7f94fd875a66b8f7d8c603faf9d
SHA5120cb502ce94180c4c44e62042cbd50b51ddde4db5bb482584fdc3f84712a9d3cca1acd5ac53f9afab2b4a51c98c9925044807f42566c76e7cacab413900054b35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54180db1037c839ed3989f6382c964f12
SHA167217e842c1316a7f62e8bd019ce7f4a21f80402
SHA2562816454fb03145830e220379ae3c8c5d524f1e975478656eba37ebe5cca079da
SHA51270a67fdb956d167fb2343d1ffb12f42f54ac91c395fa5e389f140d522144a18e1d9b01e7bfa1ab632fd40d3a9cc7898b84cc45d8a9c78d21859a3bf7781358a9
-
Filesize
581KB
MD53c3b62520e40870390b33f528a8f7619
SHA1c65f1ca358fcfbce3c1466bc47f3ed89c5d6d42a
SHA256a2f9f0e73da837b578ef0b58a3bec4795920201b81d82cdb873e3a5198bddb96
SHA512885aa492e0758099db0b631a3aa214a1cd81f42ffcd900b45293ea9a02fffd412b3fc2eb6579423a911335295d1726102b2381e4ce274e429f9193156de255a8