Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 09:07
Behavioral task
behavioral1
Sample
webhack.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
webhack.exe
Resource
win10v2004-20241007-en
General
-
Target
webhack.exe
-
Size
80KB
-
MD5
bee4a56d9ba0426d3c95dde1970f6429
-
SHA1
2bfa99521d4a4f2ed6f9b457074ecf1fae7cd712
-
SHA256
d6684b27eb3b9913fd9742bf3ce9c38e5f089211b0c105893e44eeaf79f691a2
-
SHA512
294855ac413dec844467c23ddef1dd87334d0f83f5053a6e9e0b66f032d48e748351f4fa95e166d33c4385c4734d4f4af27365d3379d480a5b5a8ecb30e5f660
-
SSDEEP
1536:NF423Du5xn5JrsFkAZb1SfMP0I6naOwi0Wasei/mH:NF42zux5WFkAZb14xaObRoH
Malware Config
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2072-1-0x00000000012E0000-0x00000000012FA000-memory.dmp family_xworm behavioral1/files/0x0009000000015fba-28.dat family_xworm behavioral1/memory/1244-36-0x0000000001250000-0x000000000126A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2524 powershell.exe 2884 powershell.exe 2820 powershell.exe -
Deletes itself 1 IoCs
pid Process 1632 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webhack.lnk webhack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webhack.lnk webhack.exe -
Executes dropped EXE 2 IoCs
pid Process 1244 webhack.exe 1608 webhack.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\webhack = "C:\\Users\\Admin\\AppData\\Local\\webhack.exe" webhack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1520 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 powershell.exe 2884 powershell.exe 2820 powershell.exe 2072 webhack.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2072 webhack.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 2072 webhack.exe Token: SeDebugPrivilege 1244 webhack.exe Token: SeDebugPrivilege 1608 webhack.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 webhack.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2524 2072 webhack.exe 30 PID 2072 wrote to memory of 2524 2072 webhack.exe 30 PID 2072 wrote to memory of 2524 2072 webhack.exe 30 PID 2072 wrote to memory of 2884 2072 webhack.exe 32 PID 2072 wrote to memory of 2884 2072 webhack.exe 32 PID 2072 wrote to memory of 2884 2072 webhack.exe 32 PID 2072 wrote to memory of 2820 2072 webhack.exe 34 PID 2072 wrote to memory of 2820 2072 webhack.exe 34 PID 2072 wrote to memory of 2820 2072 webhack.exe 34 PID 2072 wrote to memory of 2772 2072 webhack.exe 36 PID 2072 wrote to memory of 2772 2072 webhack.exe 36 PID 2072 wrote to memory of 2772 2072 webhack.exe 36 PID 1484 wrote to memory of 1244 1484 taskeng.exe 41 PID 1484 wrote to memory of 1244 1484 taskeng.exe 41 PID 1484 wrote to memory of 1244 1484 taskeng.exe 41 PID 1484 wrote to memory of 1608 1484 taskeng.exe 42 PID 1484 wrote to memory of 1608 1484 taskeng.exe 42 PID 1484 wrote to memory of 1608 1484 taskeng.exe 42 PID 2072 wrote to memory of 2572 2072 webhack.exe 43 PID 2072 wrote to memory of 2572 2072 webhack.exe 43 PID 2072 wrote to memory of 2572 2072 webhack.exe 43 PID 2072 wrote to memory of 1632 2072 webhack.exe 45 PID 2072 wrote to memory of 1632 2072 webhack.exe 45 PID 2072 wrote to memory of 1632 2072 webhack.exe 45 PID 1632 wrote to memory of 1520 1632 cmd.exe 47 PID 1632 wrote to memory of 1520 1632 cmd.exe 47 PID 1632 wrote to memory of 1520 1632 cmd.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\webhack.exe"C:\Users\Admin\AppData\Local\Temp\webhack.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\webhack.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'webhack.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\webhack.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "webhack" /tr "C:\Users\Admin\AppData\Local\webhack.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "webhack"2⤵PID:2572
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp163F.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1520
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {48644E6B-BFB4-49DC-AAC7-D06251E5E3C1} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\webhack.exeC:\Users\Admin\AppData\Local\webhack.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Users\Admin\AppData\Local\webhack.exeC:\Users\Admin\AppData\Local\webhack.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD5fe9579aee4b8d001a9469f4a732aa6a3
SHA1f1667aed32771ea9e9414147c5c7b5455a40f50d
SHA256753dd5fd92c7724ea7e73e5dd1aa0a93c3bcdddcb7a821caa825dc89b4cf5be4
SHA5129547a82fba103660d8565dab8802a40f417ac2699fcc10e510b0a56bd468c9312ca7d57ca8b7070eccb33c79eda950e4fa984a7626127521493739b70d012427
-
Filesize
80KB
MD5bee4a56d9ba0426d3c95dde1970f6429
SHA12bfa99521d4a4f2ed6f9b457074ecf1fae7cd712
SHA256d6684b27eb3b9913fd9742bf3ce9c38e5f089211b0c105893e44eeaf79f691a2
SHA512294855ac413dec844467c23ddef1dd87334d0f83f5053a6e9e0b66f032d48e748351f4fa95e166d33c4385c4734d4f4af27365d3379d480a5b5a8ecb30e5f660
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53ed501eb347a94dc2045c13010c2df43
SHA164ea25d6eff456bd5039fab8b3e11e0251068904
SHA25646d32e4e4429808524481d0daee0c79dcabbfbdf7b93b14242f693be2ecbbbab
SHA5129e92aa403e47372fb495ef1d76c5ab8dfc7a6005a3d87ab3361c5043cf8d8f8ae920f61c8bef5615645e1c05355bf55cc2530de58ec002717015492c11863b84