Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 14:50
Behavioral task
behavioral1
Sample
Spoofer.exe
Resource
win7-20241010-en
8 signatures
150 seconds
General
-
Target
Spoofer.exe
-
Size
68KB
-
MD5
0a1f42ae1cba0eca4a9f30a1e8afaa9e
-
SHA1
5fe21210113286d6e01669d36e6c767e8a0acfbc
-
SHA256
3a8ee51971cbd794a3e87c71e628108de2d87a750668b70c4baae3c0f8eda65a
-
SHA512
b41f50e5506725a1edbf0852ea96636717c016746fed23082c72510eb7f5cfaebe03e2d7a64b7b59921e72e2115dc8cd060457bbb3fe11d787c8dc01d1fd9f4d
-
SSDEEP
1536:V0FP7mVlUrMcNjDeReRqwFiMIbMGFuwjnTt1OWkXuhWN95Q:V0F8UwcNXAsnpIbMGFtHOWid5Q
Malware Config
Extracted
Family
xworm
C2
kind-sofa.gl.at.ply.gg:31503
Attributes
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1692-1-0x0000000000010000-0x0000000000028000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Spoofer.lnk Spoofer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Spoofer.lnk Spoofer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery ReAgentc.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1692 Spoofer.exe Token: SeDebugPrivilege 1692 Spoofer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3080 1692 Spoofer.exe 96 PID 1692 wrote to memory of 3080 1692 Spoofer.exe 96 PID 1692 wrote to memory of 3304 1692 Spoofer.exe 101 PID 1692 wrote to memory of 3304 1692 Spoofer.exe 101 PID 3304 wrote to memory of 5040 3304 CMD.EXE 103 PID 3304 wrote to memory of 5040 3304 CMD.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Spoofer.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SYSTEM32\CMD.EXE"CMD.EXE"2⤵PID:3080
-
-
C:\Windows\SYSTEM32\CMD.EXE"CMD.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\system32\ReAgentc.exereagentc /disable3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5040
-
-