Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 07:35

General

  • Target

    Cloudly.exe

  • Size

    9.2MB

  • MD5

    835738a04a41a463202ac670f934d584

  • SHA1

    579cc343bd073884ae498aa35a2dc064808f54e9

  • SHA256

    da4c9369654d0ecbaec7aee156c535d0cb7908d699cfe843ebe19cd06464d28a

  • SHA512

    7cf677998b8ca6050997df1fb2d6770f66df60cad7a8dc1823dbebdb2fac14d144b9bd4295245a329f715bff9487d1b0f0b7f402d0d932b833533fdb5c1939be

  • SSDEEP

    196608:kB10wrPssFP9xEFbn+ra7o45RS2q/kZYx3ArKHXxWqzzgLxq+U8lSww4BdU:kJrPPFP92cra75dZYkEBN0AcXfBdU

Malware Config

Extracted

Family

xworm

C2

feb-arrested.gl.at.ply.gg:17830

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cloudly.exe
    "C:\Users\Admin\AppData\Local\Temp\Cloudly.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\ProgramData\Cloud.exe
      "C:\ProgramData\Cloud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Cloud.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Cloud.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1328
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /f /tn "svchost"
        3⤵
          PID:2776
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpED2C.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:2740
      • C:\ProgramData\jelly.exe
        "C:\ProgramData\jelly.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\ProgramData\jelly.exe
          "C:\ProgramData\jelly.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2528
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {EC684166-0F63-4714-9E39-65793BB9E76D} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\svchost.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Cloud.exe

      Filesize

      186KB

      MD5

      bea3a6d3fe25fde4a5837129ff579eff

      SHA1

      90ab2a9b6692a7efeec4cad65bc449d6134087d9

      SHA256

      6bb2751248b7d9bf1076139d5abaee7bb6473e7375827052e68b6726cd6b80b8

      SHA512

      34f45e59d7587ff54c45d75d6df63109cc7c886ffb3de7820ac1db8236dafa5ad489c11338314121ba9829a7803d366aeea3833fbd0e99e02cc4a1cde0ae84c7

    • C:\Users\Admin\AppData\Local\Temp\tmpED2C.tmp.bat

      Filesize

      138B

      MD5

      1a930c92c5e07847742a6d13689e5e27

      SHA1

      6be79078ca8ab8f6d1d8703836c8c4ee3d2245de

      SHA256

      4e6a0bd87729fb6b013f0b6455b29bd9ef809907344dac4883be3c16fedb9c37

      SHA512

      ca9ee3011deb6e7cc505ed48bf967b7b948e75689409cfc93cdc5ab1541c88672ea2465c57e92bf52f85972cfac154f9bb4893fee3ec42b2b61e691cc4577d2a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      627afa9aca217538460181c12ed87336

      SHA1

      512704887330c2777c569ca4a4228859b99f3df5

      SHA256

      d265e1515db8930a122740f3ca8ed30e445ff38b0304edfc1e9aaf405ce6c9d6

      SHA512

      51aa6153771c9da0e75ed455116a9e5a31be4f9b131d94a1d6cd488d7ecec990a18f2a2e8995b29b7e4ec47d2992861cda67b5287858ff89153845ceca688f86

    • \ProgramData\jelly.exe

      Filesize

      8.9MB

      MD5

      36e969c7bc4386678f0937c25a89f606

      SHA1

      38a45129709b4eeb70b5daaf031dce37ca7ebda2

      SHA256

      48f717b973baa7ebc2870d10b6f99542f78736dca3f5a1517328c5591a930386

      SHA512

      aed7eb9e1378b65fa5cdcfcf45f49885c4ffe8c2d3855dde6d7d57d0c9cf2455c54496a0b229ff3a0c46df0544b9ebf3375b7ac042efa7b84ed1658ce91c0510

    • \Users\Admin\AppData\Local\Temp\_MEI26962\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      1c58526d681efe507deb8f1935c75487

      SHA1

      0e6d328faf3563f2aae029bc5f2272fb7a742672

      SHA256

      ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

      SHA512

      8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

    • \Users\Admin\AppData\Local\Temp\_MEI26962\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • \Users\Admin\AppData\Local\Temp\_MEI26962\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      724223109e49cb01d61d63a8be926b8f

      SHA1

      072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

      SHA256

      4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

      SHA512

      19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

    • \Users\Admin\AppData\Local\Temp\_MEI26962\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      517eb9e2cb671ae49f99173d7f7ce43f

      SHA1

      4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

      SHA256

      57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

      SHA512

      492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

    • \Users\Admin\AppData\Local\Temp\_MEI26962\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      d12403ee11359259ba2b0706e5e5111c

      SHA1

      03cc7827a30fd1dee38665c0cc993b4b533ac138

      SHA256

      f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

      SHA512

      9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

    • \Users\Admin\AppData\Local\Temp\_MEI26962\python313.dll

      Filesize

      5.8MB

      MD5

      3aad23292404a7038eb07ce5a6348256

      SHA1

      35cac5479699b28549ebe36c1d064bfb703f0857

      SHA256

      78b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25

      SHA512

      f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b

    • \Users\Admin\AppData\Local\Temp\_MEI26962\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • memory/1636-166-0x0000000000AE0000-0x0000000000B14000-memory.dmp

      Filesize

      208KB

    • memory/1664-92-0x0000000001E90000-0x0000000001E98000-memory.dmp

      Filesize

      32KB

    • memory/1664-91-0x000000001B610000-0x000000001B8F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2116-99-0x0000000001E80000-0x0000000001E88000-memory.dmp

      Filesize

      32KB

    • memory/2116-98-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

      Filesize

      2.9MB

    • memory/2156-0-0x000007FEF5783000-0x000007FEF5784000-memory.dmp

      Filesize

      4KB

    • memory/2156-1-0x0000000001160000-0x0000000001A96000-memory.dmp

      Filesize

      9.2MB

    • memory/2760-86-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

      Filesize

      9.9MB

    • memory/2760-72-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

      Filesize

      9.9MB

    • memory/2760-161-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

      Filesize

      9.9MB

    • memory/2760-162-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

      Filesize

      9.9MB

    • memory/2760-7-0x00000000002B0000-0x00000000002E4000-memory.dmp

      Filesize

      208KB

    • memory/2760-174-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

      Filesize

      9.9MB