Analysis
-
max time kernel
125s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 07:26
Static task
static1
Behavioral task
behavioral1
Sample
NeuraX-SpooferTEMP.exe
Resource
win7-20240729-en
General
-
Target
NeuraX-SpooferTEMP.exe
-
Size
368KB
-
MD5
35c6f16313a956763c7402b49499b1f9
-
SHA1
8f12a11413044b39cdd626be408aaae50254e4a5
-
SHA256
d76a5a1ae2f2537b56c7e0499ab5f0c8ea28d7efbbc9793a5174aabbedc74f4e
-
SHA512
fa16a5e069f5c0133674c5d3a515162a43c68cb619cf646b499fbd20b66dbc50a1dcd38003eeaa9335a95d432a8aa5bca1d0d6814011007d46b80e9556331cac
-
SSDEEP
6144:/3KWL1LMxGp99JRlnzN6gqoZ7zms0oXgd6TKU6EKKXclsBGlDstmvcHcI0us:/PLMxGpPJvzNZZ7iqgoTR2+ED0m0Hc6
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1339055156502986883/hV7TgqQ9AafNGFGpp7dC-W403JrFQJgWGzHFHp2kf7TXQCcWELY6esk8kBXS_EYrIukR
Extracted
xworm
127.0.0.1:3913
purpose-perth.gl.at.ply.gg:3913
127.0.0.1:14182
figure-cement.gl.at.ply.gg:14182
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c61-33.dat family_umbral behavioral2/memory/3496-37-0x0000018B00AD0000-0x0000018B00B10000-memory.dmp family_umbral -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023b6f-6.dat family_xworm behavioral2/files/0x0008000000023c5d-17.dat family_xworm behavioral2/memory/2100-34-0x0000000000FB0000-0x0000000000FC4000-memory.dmp family_xworm behavioral2/memory/1264-38-0x00000000007C0000-0x00000000007D6000-memory.dmp family_xworm -
Umbral family
-
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation NeuraX-SpooferTEMP.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop Window Manager.lnk skibidi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop Window Manager.lnk skibidi.exe -
Executes dropped EXE 3 IoCs
pid Process 2100 skibidi.exe 1264 Loader.exe 3496 NeuraX - CLeaner.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2100 skibidi.exe Token: SeDebugPrivilege 1264 Loader.exe Token: SeDebugPrivilege 3496 NeuraX - CLeaner.exe Token: SeIncreaseQuotaPrivilege 1652 wmic.exe Token: SeSecurityPrivilege 1652 wmic.exe Token: SeTakeOwnershipPrivilege 1652 wmic.exe Token: SeLoadDriverPrivilege 1652 wmic.exe Token: SeSystemProfilePrivilege 1652 wmic.exe Token: SeSystemtimePrivilege 1652 wmic.exe Token: SeProfSingleProcessPrivilege 1652 wmic.exe Token: SeIncBasePriorityPrivilege 1652 wmic.exe Token: SeCreatePagefilePrivilege 1652 wmic.exe Token: SeBackupPrivilege 1652 wmic.exe Token: SeRestorePrivilege 1652 wmic.exe Token: SeShutdownPrivilege 1652 wmic.exe Token: SeDebugPrivilege 1652 wmic.exe Token: SeSystemEnvironmentPrivilege 1652 wmic.exe Token: SeRemoteShutdownPrivilege 1652 wmic.exe Token: SeUndockPrivilege 1652 wmic.exe Token: SeManageVolumePrivilege 1652 wmic.exe Token: 33 1652 wmic.exe Token: 34 1652 wmic.exe Token: 35 1652 wmic.exe Token: 36 1652 wmic.exe Token: SeIncreaseQuotaPrivilege 1652 wmic.exe Token: SeSecurityPrivilege 1652 wmic.exe Token: SeTakeOwnershipPrivilege 1652 wmic.exe Token: SeLoadDriverPrivilege 1652 wmic.exe Token: SeSystemProfilePrivilege 1652 wmic.exe Token: SeSystemtimePrivilege 1652 wmic.exe Token: SeProfSingleProcessPrivilege 1652 wmic.exe Token: SeIncBasePriorityPrivilege 1652 wmic.exe Token: SeCreatePagefilePrivilege 1652 wmic.exe Token: SeBackupPrivilege 1652 wmic.exe Token: SeRestorePrivilege 1652 wmic.exe Token: SeShutdownPrivilege 1652 wmic.exe Token: SeDebugPrivilege 1652 wmic.exe Token: SeSystemEnvironmentPrivilege 1652 wmic.exe Token: SeRemoteShutdownPrivilege 1652 wmic.exe Token: SeUndockPrivilege 1652 wmic.exe Token: SeManageVolumePrivilege 1652 wmic.exe Token: 33 1652 wmic.exe Token: 34 1652 wmic.exe Token: 35 1652 wmic.exe Token: 36 1652 wmic.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2100 1572 NeuraX-SpooferTEMP.exe 86 PID 1572 wrote to memory of 2100 1572 NeuraX-SpooferTEMP.exe 86 PID 1572 wrote to memory of 1264 1572 NeuraX-SpooferTEMP.exe 87 PID 1572 wrote to memory of 1264 1572 NeuraX-SpooferTEMP.exe 87 PID 1572 wrote to memory of 3496 1572 NeuraX-SpooferTEMP.exe 88 PID 1572 wrote to memory of 3496 1572 NeuraX-SpooferTEMP.exe 88 PID 3496 wrote to memory of 1652 3496 NeuraX - CLeaner.exe 91 PID 3496 wrote to memory of 1652 3496 NeuraX - CLeaner.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeuraX-SpooferTEMP.exe"C:\Users\Admin\AppData\Local\Temp\NeuraX-SpooferTEMP.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\skibidi.exe"C:\Users\Admin\AppData\Roaming\skibidi.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Roaming\Loader.exe"C:\Users\Admin\AppData\Roaming\Loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Roaming\NeuraX - CLeaner.exe"C:\Users\Admin\AppData\Roaming\NeuraX - CLeaner.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD58d81cb248bc3cabb8f870d305c9da628
SHA12faf8b5e88d237198cf3a0d83dce6eeb72df5905
SHA256864adf43fb7566bc89eddae126babe13e9556d9da44ef4ef6e81484559289ac9
SHA512c93a22d82719c6da6123fc81caa1b714e828ec14c85931da3890fe548094103f80793c5c1de67af0b93f2d078ee410a10a5b3896ba512b385759ab9dae26a28d
-
Filesize
231KB
MD5c4f0439175ac80f05ffec5da48d45ed4
SHA145350dbb06357d1230dba9184f1899d9d737866c
SHA256a5c3af3b30e50f1202cafd220074543bc956de20186abe3f750163223da4528a
SHA512ebb6c0c650e051761dad6d969f2da3e433998d5d01d28823fed5652aeb85aaacfbcc6b849d7d4bc01967d9552b9f862b50ced554ab932c12b5b7a683fdc0bfbd
-
Filesize
57KB
MD594d345c8c8058719dfcc325caf73ce94
SHA1c8ed543bdd54e52f3b6624f5820dd5d2e05e1367
SHA256e0882f68128a2b2e2aa7b8473d31e47691f8bce2c76dd293dae24bbf8c8a1918
SHA512deb8b44169b1217f0598ae32b9bc101e04074226630da81239581d51682cd19172e0a9d56fb4a27434fd343b32bcf8fe926a299bad686e2ebdbde2646b88d1dd