Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 15:47

General

  • Target

    TDMenu_x64.exe

  • Size

    6.4MB

  • MD5

    3f9d8993daa6e07221f9a12eaa011ca6

  • SHA1

    a33290d94fb3bba06337b7b847d971b1a8fd6110

  • SHA256

    109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79

  • SHA512

    ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0

  • SSDEEP

    98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT

Malware Config

Extracted

Family

xworm

C2

23.27.201.57:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    DirectX End-User Runtime.exe

Extracted

Family

redline

Botnet

godseye3-01-25

C2

23.27.201.57:62529

Signatures

  • Detect Xworm Payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\ProgramData\TDMenu.exe
      "C:\ProgramData\TDMenu.exe"
      2⤵
      • Executes dropped EXE
      PID:2488
    • C:\ProgramData\DirectX End-User Runtime.exe
      "C:\ProgramData\DirectX End-User Runtime.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1980
    • C:\ProgramData\GameBar-Update-Service.exe
      "C:\ProgramData\GameBar-Update-Service.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2480
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
          • Drops file in Windows directory
          PID:2664
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "Xbox GameBar Update"
        3⤵
        • Launches sc.exe
        PID:2668
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:2644
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:796
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "Xbox GameBar Update"
        3⤵
        • Launches sc.exe
        PID:1608
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 3
          4⤵
            PID:2928
    • C:\ProgramData\XboxGame\GameBarUpdateService.exe
      C:\ProgramData\XboxGame\GameBarUpdateService.exe
      1⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
          • Drops file in Windows directory
          PID:1188
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:1904
        • C:\Windows\explorer.exe
          explorer.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {DB0102E1-1DF0-44BF-8F75-58B3546951C6} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]
        1⤵
          PID:2520

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\DirectX End-User Runtime.exe

          Filesize

          77KB

          MD5

          18d86f6b69457eb245764f48643697df

          SHA1

          81da90762a99e970874a1c9a0ce60c267c02b18c

          SHA256

          75a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33

          SHA512

          9e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0PO5AQGQQQYEW4LANTYV.temp

          Filesize

          7KB

          MD5

          65c0cfbb74b5a352e0d5b8ff0d0dfd6b

          SHA1

          496972cc6e247284084f99107e9031148101eee0

          SHA256

          36ed94edf230424626e0d6c965fb61447d7584eab188f2be0fe766fbb3471c17

          SHA512

          7bcc025db0b08e22b05ae4aff3a394f6e9a1d40310ecf8df71b46be144b1a253aff8dc73f8e0757f7024c86f74953e0e677d05b64b063c497bba947180dc9d04

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          19f2457d35473a3a132c0923c7795ac1

          SHA1

          139bcfe7009cb4d58d0131260f3ce865b4b01827

          SHA256

          d1774b45d27cc4f131d949c584a87b147c9f102d682ffc59576091313c3a611c

          SHA512

          ca1a745ad269a4012e6d7696a94b0a6d761b93ad95e5d26ebdfe2c5184365a7d380bca9519b4b9246734325718cc5c2f3fde81b25dd0d38e4863febd3bb0f8ef

        • C:\Windows\system32\drivers\etc\hosts

          Filesize

          2KB

          MD5

          12d66cedb71979f4c004a5d65ad408b8

          SHA1

          87fee242855bd27e7019f7f6addebb2664d57d87

          SHA256

          ab7d0a7491f316d8ded0298a820c3606ef2290eb736c45166e052659c5b25094

          SHA512

          9a62e74db84872e1e12198b4cb436db073ed8a68d060a5a0514a0aa33167512f271ce2580fd2a0157973d27be3ca7e56be4793a9546e2a4fe2bf15de939ff1ea

        • \ProgramData\GameBar-Update-Service.exe

          Filesize

          5.1MB

          MD5

          02f3666b4f382f4b9c64ddda3183ab7e

          SHA1

          ef7828f1040da2c09788d56a0205358fcc533065

          SHA256

          2b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6

          SHA512

          7b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75

        • \ProgramData\TDMenu.exe

          Filesize

          1.2MB

          MD5

          443a251e35d62f4ca4aeb3b5350adea9

          SHA1

          edd6c016656e1eb673066cb19f6d0187e4db046f

          SHA256

          8f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e

          SHA512

          91b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94

        • memory/1076-67-0x0000000002310000-0x0000000002318000-memory.dmp

          Filesize

          32KB

        • memory/1904-46-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/1904-44-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/1904-40-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/1904-41-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/1904-42-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/1904-43-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/2008-36-0x0000000019F40000-0x000000001A222000-memory.dmp

          Filesize

          2.9MB

        • memory/2008-37-0x00000000009A0000-0x00000000009A8000-memory.dmp

          Filesize

          32KB

        • memory/2120-21-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2120-22-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2120-87-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2120-32-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2120-12-0x0000000000FB0000-0x0000000000FCA000-memory.dmp

          Filesize

          104KB

        • memory/2120-88-0x0000000000F90000-0x0000000000FAE000-memory.dmp

          Filesize

          120KB

        • memory/2244-51-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-52-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-60-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-58-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-57-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-55-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-56-0x0000000000240000-0x0000000000260000-memory.dmp

          Filesize

          128KB

        • memory/2244-54-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-53-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-59-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-61-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-50-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-49-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-68-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2244-69-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/2528-0-0x000007FEF51C3000-0x000007FEF51C4000-memory.dmp

          Filesize

          4KB

        • memory/2528-1-0x0000000000010000-0x000000000067E000-memory.dmp

          Filesize

          6.4MB

        • memory/2812-28-0x0000000001E40000-0x0000000001E48000-memory.dmp

          Filesize

          32KB

        • memory/2812-27-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

          Filesize

          2.9MB