Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 17:29
Behavioral task
behavioral1
Sample
ratka.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ratka.exe
Resource
win10v2004-20250217-en
General
-
Target
ratka.exe
-
Size
80KB
-
MD5
39ffa7b287f2d822703a6deea560dcbd
-
SHA1
34ae6406ec73ad02955cb7676b37489fdab1695b
-
SHA256
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05
-
SHA512
7efa49f3c9ba846d6382e7683d64a5b00232c459028a177b07c0e4f28f06682bd3a219421a355515766007bee9e0dfcce5e243afba73290487057542a644cc40
-
SSDEEP
1536:GeKbbG1+cDVWr5hLbwWV5hcEW07Z4E+bCXsEN9qtgq6rLs4ORpmcG1h:GeKbb60r5hLbwWVcPk1+b8JY4ORpmth
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2972-1-0x0000000000D30000-0x0000000000D4A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 316 powershell.exe 2316 powershell.exe 2064 powershell.exe 2872 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ratka.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ratka.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ratka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 316 powershell.exe 2316 powershell.exe 2064 powershell.exe 2872 powershell.exe 2972 ratka.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2972 ratka.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2972 ratka.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2972 ratka.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2972 wrote to memory of 316 2972 ratka.exe 30 PID 2972 wrote to memory of 316 2972 ratka.exe 30 PID 2972 wrote to memory of 316 2972 ratka.exe 30 PID 2972 wrote to memory of 2316 2972 ratka.exe 32 PID 2972 wrote to memory of 2316 2972 ratka.exe 32 PID 2972 wrote to memory of 2316 2972 ratka.exe 32 PID 2972 wrote to memory of 2064 2972 ratka.exe 34 PID 2972 wrote to memory of 2064 2972 ratka.exe 34 PID 2972 wrote to memory of 2064 2972 ratka.exe 34 PID 2972 wrote to memory of 2872 2972 ratka.exe 36 PID 2972 wrote to memory of 2872 2972 ratka.exe 36 PID 2972 wrote to memory of 2872 2972 ratka.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ratka.exe"C:\Users\Admin\AppData\Local\Temp\ratka.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ratka.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ratka.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b1a49f10be5074272cee72c9f3c3b8df
SHA12a9afa76e0ca8dfbc1c7d073c3823cc57a778568
SHA25656dd947c9be14128a1d5d0ba16a8912e60cc380e7731a19650a3faa2dad840b3
SHA512272d2ad54cd6e087419cc5f3fe6f8688cf215a627182acb18ae5058fa09c2e9f739d47bce3f5bc9b105ea0cc063a626e9ac5491221270684c6ca40e68142fe70