Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 16:35
Behavioral task
behavioral1
Sample
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
Resource
win10v2004-20241007-en
General
-
Target
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
-
Size
85KB
-
MD5
9fd2b5615fe45e09f52e280823633662
-
SHA1
55816fcadff841d76b00e5cd32869a586bdd7f8f
-
SHA256
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e
-
SHA512
b9170e95e2e2b0db7ff364840e8260eed8f37cf4f393cd3e661be9b4309ad44e5e0c891e2a026e84e8b605a9f1ecb805ed8a2e48cf2dd559306a86e34cd58a17
-
SSDEEP
1536:wgLOZCLbRcbwXpTpli0/eC/CiAQRbAwO4c06Qe6ulOfBIWZ65hUV6faFl:NLECL9cbIf6KRbAm6QelOffeLaFl
Malware Config
Extracted
xworm
asia-capabilities.gl.at.ply.gg:63098
-
Install_directory
%Temp%
-
install_file
Explorer.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2344-1-0x00000000011B0000-0x00000000011CC000-memory.dmp family_xworm behavioral1/files/0x000d000000012280-37.dat family_xworm behavioral1/memory/2968-39-0x00000000013A0000-0x00000000013BC000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2912 powershell.exe 2900 powershell.exe 2088 powershell.exe 908 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explorer.lnk ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explorer.lnk ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 Explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Explorer.exe" ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2088 powershell.exe 908 powershell.exe 2912 powershell.exe 2900 powershell.exe 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe Token: SeDebugPrivilege 2968 Explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2088 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 30 PID 2344 wrote to memory of 2088 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 30 PID 2344 wrote to memory of 2088 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 30 PID 2344 wrote to memory of 908 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 32 PID 2344 wrote to memory of 908 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 32 PID 2344 wrote to memory of 908 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 32 PID 2344 wrote to memory of 2912 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 34 PID 2344 wrote to memory of 2912 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 34 PID 2344 wrote to memory of 2912 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 34 PID 2344 wrote to memory of 2900 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 36 PID 2344 wrote to memory of 2900 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 36 PID 2344 wrote to memory of 2900 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 36 PID 2344 wrote to memory of 2656 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 38 PID 2344 wrote to memory of 2656 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 38 PID 2344 wrote to memory of 2656 2344 ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe 38 PID 2984 wrote to memory of 2968 2984 taskeng.exe 43 PID 2984 wrote to memory of 2968 2984 taskeng.exe 43 PID 2984 wrote to memory of 2968 2984 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe"C:\Users\Admin\AppData\Local\Temp\ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Explorer" /tr "C:\Users\Admin\AppData\Local\Temp\Explorer.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {93DA3E92-2445-4023-AB8E-765F2D368C1F} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exeC:\Users\Admin\AppData\Local\Temp\Explorer.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD59fd2b5615fe45e09f52e280823633662
SHA155816fcadff841d76b00e5cd32869a586bdd7f8f
SHA256ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e
SHA512b9170e95e2e2b0db7ff364840e8260eed8f37cf4f393cd3e661be9b4309ad44e5e0c891e2a026e84e8b605a9f1ecb805ed8a2e48cf2dd559306a86e34cd58a17
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cf52ba00f94b0aa525a238b85abe858f
SHA1c8d346e0067ca31924a295345c2719982492aa99
SHA2562a3ae4215a94ab2f0c42af77da60a4fb631df6c229c8edf58f3b256443e7126d
SHA5125ebc892e86905f8769d166b8be98824020a18aa87f2b9ab65b13c2162d357a2820d9484a9cd86c7a92f28b21df31e5800a545ea301deac056bdb91f99ee9a718