Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 02:08
Behavioral task
behavioral1
Sample
0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe
Resource
win7-20240903-en
General
-
Target
0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe
-
Size
828KB
-
MD5
f2dba5b93fa78fe0357cae18d68bc13f
-
SHA1
686e5e1ae65116c4d22315b15992163ad4d34f7c
-
SHA256
0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570
-
SHA512
cc9714c48fc9c36f98ec2230e96efd5016c254059cf23ea7ccf318e3e44337559e6f5f48d5b9367a10c5b87bd05df6345c58c64eb728769f649b2411f4dc3970
-
SSDEEP
12288:pMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9rR0uvsj:pnsJ39LyjbJkQFMhmC+6GD9Fl0
Malware Config
Extracted
xworm
simply-exotic.gl.at.ply.gg:27183
-
Install_directory
%Temp%
-
install_file
Windows.exe
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Detect Xworm Payload 10 IoCs
resource yara_rule behavioral1/files/0x000b00000001226a-4.dat family_xworm behavioral1/files/0x00080000000161f6-12.dat family_xworm behavioral1/memory/1916-25-0x0000000000400000-0x00000000004D5000-memory.dmp family_xworm behavioral1/memory/1920-26-0x00000000003C0000-0x00000000003DA000-memory.dmp family_xworm behavioral1/memory/2912-36-0x00000000001E0000-0x00000000001FA000-memory.dmp family_xworm behavioral1/memory/2108-142-0x0000000000400000-0x00000000004D5000-memory.dmp family_xworm behavioral1/memory/2108-143-0x0000000000400000-0x00000000004D5000-memory.dmp family_xworm behavioral1/memory/3012-150-0x0000000000E10000-0x0000000000E2A000-memory.dmp family_xworm behavioral1/memory/2108-180-0x0000000000400000-0x00000000004D5000-memory.dmp family_xworm behavioral1/memory/2180-186-0x0000000001390000-0x00000000013AA000-memory.dmp family_xworm -
Xred family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2028 powershell.exe 1676 powershell.exe 2976 powershell.exe 700 powershell.exe -
resource behavioral1/files/0x000700000001706d-85.dat behavioral1/files/0x000900000001706d-109.dat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\User.lnk ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\User.lnk ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe -
Executes dropped EXE 5 IoCs
pid Process 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 2108 Synaptics.exe 2912 ._cache_Synaptics.exe 3012 User 2180 User -
Loads dropped DLL 5 IoCs
pid Process 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 2108 Synaptics.exe 2108 Synaptics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\User = "C:\\Users\\Admin\\AppData\\Local\\Temp\\User" ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1516 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2896 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 700 powershell.exe 2028 powershell.exe 1676 powershell.exe 2976 powershell.exe 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe Token: SeDebugPrivilege 2912 ._cache_Synaptics.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe Token: SeDebugPrivilege 3012 User Token: SeDebugPrivilege 2180 User -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 EXCEL.EXE 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1920 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 31 PID 1916 wrote to memory of 1920 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 31 PID 1916 wrote to memory of 1920 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 31 PID 1916 wrote to memory of 1920 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 31 PID 1916 wrote to memory of 2108 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 32 PID 1916 wrote to memory of 2108 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 32 PID 1916 wrote to memory of 2108 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 32 PID 1916 wrote to memory of 2108 1916 0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 32 PID 2108 wrote to memory of 2912 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2912 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2912 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2912 2108 Synaptics.exe 33 PID 1920 wrote to memory of 700 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 37 PID 1920 wrote to memory of 700 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 37 PID 1920 wrote to memory of 700 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 37 PID 1920 wrote to memory of 2028 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 39 PID 1920 wrote to memory of 2028 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 39 PID 1920 wrote to memory of 2028 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 39 PID 1920 wrote to memory of 1676 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 41 PID 1920 wrote to memory of 1676 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 41 PID 1920 wrote to memory of 1676 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 41 PID 1920 wrote to memory of 2976 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 43 PID 1920 wrote to memory of 2976 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 43 PID 1920 wrote to memory of 2976 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 43 PID 1920 wrote to memory of 1516 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 46 PID 1920 wrote to memory of 1516 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 46 PID 1920 wrote to memory of 1516 1920 ._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe 46 PID 2652 wrote to memory of 3012 2652 taskeng.exe 49 PID 2652 wrote to memory of 3012 2652 taskeng.exe 49 PID 2652 wrote to memory of 3012 2652 taskeng.exe 49 PID 2652 wrote to memory of 2180 2652 taskeng.exe 51 PID 2652 wrote to memory of 2180 2652 taskeng.exe 51 PID 2652 wrote to memory of 2180 2652 taskeng.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe"C:\Users\Admin\AppData\Local\Temp\0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\User'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'User'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "User" /tr "C:\Users\Admin\AppData\Local\Temp\User"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1516
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2896
-
C:\Windows\system32\taskeng.exetaskeng.exe {58C82688-EE63-472E-AB7D-6A2CB0C3912B} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\UserC:\Users\Admin\AppData\Local\Temp\User2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\UserC:\Users\Admin\AppData\Local\Temp\User2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5f2dba5b93fa78fe0357cae18d68bc13f
SHA1686e5e1ae65116c4d22315b15992163ad4d34f7c
SHA2560d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570
SHA512cc9714c48fc9c36f98ec2230e96efd5016c254059cf23ea7ccf318e3e44337559e6f5f48d5b9367a10c5b87bd05df6345c58c64eb728769f649b2411f4dc3970
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD565b060e32f38c937c2ec3f78cb7e0cd3
SHA1dae46573005541d5b7084840e5e9cd86c3bcbabd
SHA25668e12bb849ba990d60591c2d2c51a94fd9656c838c026c0022ff829e024dde4c
SHA512b3868b3bb1cd928803005f763d8143577705f5ab4d2c318fe808732d248b7d4b7c197fdc1891cf1e68816612dc598f9c0e4fc0cd5036f1c8e074e419471273d1
-
Filesize
29KB
MD5894e9a4da6b3fa56f7579427106a11f3
SHA154a9e74fe71b8b66dd6c77316c5e279f14e43a03
SHA2567200e3c84a891674ba9ab4a8cb9780e377c3e9d1c47ed4ad6acf8ef63644ca25
SHA51244b86770e1757332960fa5f4cf46c8c2765bf325e0cdce4277542193bc0244441c4a465b4592381a2eceb011392ba81f21d19be10ecc3c4e17016a0420a62b86
-
Filesize
26KB
MD587cee1ca99683c4ba052fbf0524a2b6c
SHA187bc86c32505c199e8c28a69b2655118e560afd1
SHA256f7d77025eb27c08374b9407aa2b7e4fdef334c17ca6fd7256244b6b5d442f7e9
SHA5123909c7d2733e0b5150112fa9c03cf6b9564424d3e94c85331eb4591ac7e11b2d8c86b0325721899cd97627feb9de3e4cd40beaf5e934bfc0282a8ac8e2772f83
-
Filesize
30KB
MD521388e959b4085dc751e00365de2ee42
SHA1b9e0c8f67feea586c416a533ab40e9b0e9240cda
SHA256894a4d967ed243baa1a180ec49876b5c0d60ace9fba855573f333129efb769fd
SHA5120ed8f8a80f1e881ef66547bbe38923590062099d6e076ddca94766f89531e73d1dab92cc70cb0b03fab9c9d619bdf152b595b01a5e7c5e91e539e72b4bac00cc
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5623ba63a4264fc08aa0b19e48f94c2a1
SHA1e4c0cfbcee4921294685ccecfe5a1c9599f76fa2
SHA25687e5b8b249c588e6f578aa4d78dce75acc730da69d937380c76c477980d14f6d
SHA512855957647c42910082715f663721f0c56062cb2d0a8cd7703d9b814c53715b99f39893078feec85736caba329345129b87041f653d26310575a28eb1951ef085
-
\Users\Admin\AppData\Local\Temp\._cache_0d8cc0a75238c05e1b072683ee43d7e0bf827dde7a652df1467333a2b1f6a570.exe
Filesize75KB
MD5f63d6c11422e7e0ca83981e8dae62f96
SHA1c9c6088a764b07e7d438ad603a8bfcd9972f2b06
SHA2567ed1b4c14c9dfc97094ac40c5fb6c1fe109e4bfcbc953f2ba4331686388be531
SHA512b4dc1037a4fa38482e355aa3f4ac8288aa926dd7c24ee5cd260b5418ebd9ba6a53ef41f3e862eaa71795a2d0b7407fc9d700ec9a224d45f4b7af1e2063f991d9