Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20250211-en -
resource tags
arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-02-2025 16:01
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win10ltsc2021-20250211-en
General
-
Target
Output.exe
-
Size
318KB
-
MD5
76250a84f46395d5e50ba0178b714099
-
SHA1
fde7f65d449d42bd59d38ad99430663f7c4ece51
-
SHA256
f6cf0bc000965baa8fd8c103be34aa1ca9514c3e97f0a48b4558d2ab8b346e9c
-
SHA512
6bfb0eb5482e7635e25b65ac3e45e6eaf80e051cf742c7523ee4ff7b2de283e80d4294981747ad740a79f2ed0b54e068a75c3df69c85a9da423d5d3932ec0705
-
SSDEEP
6144:o2EX/IoKtm284A7aWAAAs1JuNAbq1QQYNbmkWA:3EXQDtN84YaWAA3IAuJO
Malware Config
Extracted
xworm
147.185.221.25:64820
-
Install_directory
%Temp%
-
install_file
SecurityHost.exe
-
telegram
https://api.telegram.org/bot7873282441:AAFVeYQ8VZCC3gF8qlaTYIz4N-gMEL21mHI/sendMessage?chat_id=7952080340
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral2/files/0x001d00000002adce-35.dat family_umbral behavioral2/memory/2244-61-0x000001E0EA180000-0x000001E0EA1C0000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x001d00000002ad4e-6.dat family_xworm behavioral2/memory/3612-62-0x0000000000340000-0x0000000000358000-memory.dmp family_xworm -
Umbral family
-
Xworm family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 13 1228 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3612 1.16.5.exe 2244 SystemHost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1600 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 3612 1.16.5.exe Token: SeDebugPrivilege 2244 SystemHost.exe Token: SeIncreaseQuotaPrivilege 1268 wmic.exe Token: SeSecurityPrivilege 1268 wmic.exe Token: SeTakeOwnershipPrivilege 1268 wmic.exe Token: SeLoadDriverPrivilege 1268 wmic.exe Token: SeSystemProfilePrivilege 1268 wmic.exe Token: SeSystemtimePrivilege 1268 wmic.exe Token: SeProfSingleProcessPrivilege 1268 wmic.exe Token: SeIncBasePriorityPrivilege 1268 wmic.exe Token: SeCreatePagefilePrivilege 1268 wmic.exe Token: SeBackupPrivilege 1268 wmic.exe Token: SeRestorePrivilege 1268 wmic.exe Token: SeShutdownPrivilege 1268 wmic.exe Token: SeDebugPrivilege 1268 wmic.exe Token: SeSystemEnvironmentPrivilege 1268 wmic.exe Token: SeRemoteShutdownPrivilege 1268 wmic.exe Token: SeUndockPrivilege 1268 wmic.exe Token: SeManageVolumePrivilege 1268 wmic.exe Token: 33 1268 wmic.exe Token: 34 1268 wmic.exe Token: 35 1268 wmic.exe Token: 36 1268 wmic.exe Token: SeIncreaseQuotaPrivilege 1268 wmic.exe Token: SeSecurityPrivilege 1268 wmic.exe Token: SeTakeOwnershipPrivilege 1268 wmic.exe Token: SeLoadDriverPrivilege 1268 wmic.exe Token: SeSystemProfilePrivilege 1268 wmic.exe Token: SeSystemtimePrivilege 1268 wmic.exe Token: SeProfSingleProcessPrivilege 1268 wmic.exe Token: SeIncBasePriorityPrivilege 1268 wmic.exe Token: SeCreatePagefilePrivilege 1268 wmic.exe Token: SeBackupPrivilege 1268 wmic.exe Token: SeRestorePrivilege 1268 wmic.exe Token: SeShutdownPrivilege 1268 wmic.exe Token: SeDebugPrivilege 1268 wmic.exe Token: SeSystemEnvironmentPrivilege 1268 wmic.exe Token: SeRemoteShutdownPrivilege 1268 wmic.exe Token: SeUndockPrivilege 1268 wmic.exe Token: SeManageVolumePrivilege 1268 wmic.exe Token: 33 1268 wmic.exe Token: 34 1268 wmic.exe Token: 35 1268 wmic.exe Token: 36 1268 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3612 4356 Output.exe 85 PID 4356 wrote to memory of 3612 4356 Output.exe 85 PID 4356 wrote to memory of 2244 4356 Output.exe 86 PID 4356 wrote to memory of 2244 4356 Output.exe 86 PID 2244 wrote to memory of 1268 2244 SystemHost.exe 87 PID 2244 wrote to memory of 1268 2244 SystemHost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Output.exe"C:\Users\Admin\AppData\Local\Temp\Output.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\1.16.5.exe"C:\Users\Admin\1.16.5.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\SystemHost.exe"C:\Users\Admin\SystemHost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczOTI4MjMwMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzUzNTk3Mjc0MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyNjk1MDA5NjUiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD53f1ac1dffbe4df5e87166066deee2410
SHA143f9efcdb2bef961228ae0f3004b73949ee94984
SHA25615306ecd3704d44dc0ad16a88e94a73fb59252dc6ec308b291db7138dd811bda
SHA5124b5ae7a83c1abd3f2492859ec2e0b63e644476c647092da2df9d45ac93b6014e89b44e1c3ec60fe2ac1a3d428efa26e22714fff5b6bda183086bd00f6c18c59e
-
Filesize
227KB
MD5e07b0bddb4e6c86e0e565ec1623d35c4
SHA111bc4bb5b2af5633a50c2bfb6b1b9b23b7f27fc7
SHA25635c09de560097ccb637a089452552fcd8313dcb4a75e9a85c60501b35e477f9f
SHA5123af156d2b01cd43f01843ae3335ad0603a5d86196f04bc2b49467060b4a761f10ec11222dbdb3bb5e1387921e0113b10e629e35945bf6f192fc6140e5b3a036e