General
-
Target
-
Size
496KB
-
Sample
250213-mkna4sxmaz
-
MD5
ca43984bc9574b8f5af508c4f48d8dd5
-
SHA1
0737a7a9ef6926c14da0d36f3a5212b93c6873a8
-
SHA256
6cadc3f6fb39a43ba42a2f4039582c0821bca45ab9cf8ac6e44287f9862aca3f
-
SHA512
b0e97b13a1683af914b5e395df94ea9d06ef4f5d155cb7fbfff8d4f8f8a1f5ef3b510d5dcee07ecf0d403490b33c1e6c47f9acfcf9469b6f9c72360cf7ae3769
-
SSDEEP
12288:QXIKvF8VExLMgUR1YvgpC/H/u022/ZN0JVtgUb48td7J:c8VkLMTBYHu022hN0f11td7J
Static task
static1
Malware Config
Extracted
xworm
that-mortgages.gl.at.ply.gg:8888
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826
Extracted
gurcu
https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826
Targets
-
-
Target
-
Size
496KB
-
MD5
ca43984bc9574b8f5af508c4f48d8dd5
-
SHA1
0737a7a9ef6926c14da0d36f3a5212b93c6873a8
-
SHA256
6cadc3f6fb39a43ba42a2f4039582c0821bca45ab9cf8ac6e44287f9862aca3f
-
SHA512
b0e97b13a1683af914b5e395df94ea9d06ef4f5d155cb7fbfff8d4f8f8a1f5ef3b510d5dcee07ecf0d403490b33c1e6c47f9acfcf9469b6f9c72360cf7ae3769
-
SSDEEP
12288:QXIKvF8VExLMgUR1YvgpC/H/u022/ZN0JVtgUb48td7J:c8VkLMTBYHu022hN0f11td7J
-
Detect Xworm Payload
-
Gurcu family
-
UAC bypass
-
Windows security bypass
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
4Indicator Removal
1Clear Persistence
1Modify Registry
9Subvert Trust Controls
1SIP and Trust Provider Hijacking
1