Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 02:12
Behavioral task
behavioral1
Sample
234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe
Resource
win10v2004-20250217-en
General
-
Target
234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe
-
Size
76KB
-
MD5
ad6bad60fc5ad8e7f7353e7b787bfb4d
-
SHA1
48f7a8a0c7f06e384cea2fafec62b41e1e5cd567
-
SHA256
234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be
-
SHA512
e2a9aec9dae0649c3e84254c481a772a928da938d43970871770ca9e3d782b81584266fc7f192a82e20cbedab201a198c94173103883081ca356a4c3ed64283c
-
SSDEEP
1536:dNZaFIN/AGCqxzs+bi15FU6oK/1OU4tXGSKUkdS1EAd8IIp:dOFIN/LRFs+biRNOU4Jy9gEA6IIp
Malware Config
Extracted
xworm
la-judgment.gl.at.ply.gg:62627
-
Install_directory
%ProgramData%
-
install_file
update.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2892-1-0x0000000000C40000-0x0000000000C58000-memory.dmp family_xworm behavioral1/files/0x002f000000018b59-35.dat family_xworm behavioral1/memory/2300-37-0x00000000010F0000-0x0000000001108000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2000 powershell.exe 2800 powershell.exe 2868 powershell.exe 580 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe -
Executes dropped EXE 3 IoCs
pid Process 2300 update.exe 1096 update.exe 2932 update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\update = "C:\\ProgramData\\update.exe" 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2800 powershell.exe 2868 powershell.exe 580 powershell.exe 2000 powershell.exe 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe Token: SeDebugPrivilege 2300 update.exe Token: SeDebugPrivilege 1096 update.exe Token: SeDebugPrivilege 2932 update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2800 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 30 PID 2892 wrote to memory of 2800 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 30 PID 2892 wrote to memory of 2800 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 30 PID 2892 wrote to memory of 2868 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 32 PID 2892 wrote to memory of 2868 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 32 PID 2892 wrote to memory of 2868 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 32 PID 2892 wrote to memory of 580 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 34 PID 2892 wrote to memory of 580 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 34 PID 2892 wrote to memory of 580 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 34 PID 2892 wrote to memory of 2000 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 36 PID 2892 wrote to memory of 2000 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 36 PID 2892 wrote to memory of 2000 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 36 PID 2892 wrote to memory of 2168 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 38 PID 2892 wrote to memory of 2168 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 38 PID 2892 wrote to memory of 2168 2892 234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe 38 PID 2180 wrote to memory of 2300 2180 taskeng.exe 41 PID 2180 wrote to memory of 2300 2180 taskeng.exe 41 PID 2180 wrote to memory of 2300 2180 taskeng.exe 41 PID 2180 wrote to memory of 1096 2180 taskeng.exe 43 PID 2180 wrote to memory of 1096 2180 taskeng.exe 43 PID 2180 wrote to memory of 1096 2180 taskeng.exe 43 PID 2180 wrote to memory of 2932 2180 taskeng.exe 44 PID 2180 wrote to memory of 2932 2180 taskeng.exe 44 PID 2180 wrote to memory of 2932 2180 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe"C:\Users\Admin\AppData\Local\Temp\234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "update" /tr "C:\ProgramData\update.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2168
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {53C2CA30-63CC-4C14-97DB-2CE449D7B9FF} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\ProgramData\update.exeC:\ProgramData\update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\ProgramData\update.exeC:\ProgramData\update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\ProgramData\update.exeC:\ProgramData\update.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ad6bad60fc5ad8e7f7353e7b787bfb4d
SHA148f7a8a0c7f06e384cea2fafec62b41e1e5cd567
SHA256234ea596c74a48e69cee880ce2bf83bfa7cc616220655726ee8e8e57b4fea1be
SHA512e2a9aec9dae0649c3e84254c481a772a928da938d43970871770ca9e3d782b81584266fc7f192a82e20cbedab201a198c94173103883081ca356a4c3ed64283c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD559b750adf023bb815f2b76c32cc8b846
SHA1fa4ee80367da62135d0b87ac0debb39a96dab99c
SHA2562620c85814d6f3708eb5e683f1efa02428d1005a79119c291ac437da6701fa59
SHA512809324f1c4854bc648991cf659dc3f71debc5da37b5e7f9499dd499914a7cc0bb3d344408f91407d869dabaee8fa3ddd041b94e956d2f85f55190a22b5bf6746