Analysis

  • max time kernel
    1047s
  • max time network
    908s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02/03/2025, 17:03

General

  • Target

    ratka.exe

  • Size

    80KB

  • MD5

    39ffa7b287f2d822703a6deea560dcbd

  • SHA1

    34ae6406ec73ad02955cb7676b37489fdab1695b

  • SHA256

    9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05

  • SHA512

    7efa49f3c9ba846d6382e7683d64a5b00232c459028a177b07c0e4f28f06682bd3a219421a355515766007bee9e0dfcce5e243afba73290487057542a644cc40

  • SSDEEP

    1536:GeKbbG1+cDVWr5hLbwWV5hcEW07Z4E+bCXsEN9qtgq6rLs4ORpmcG1h:GeKbb60r5hLbwWVcPk1+b8JY4ORpmth

Malware Config

Extracted

Family

xworm

C2

cause-indexes.gl.at.ply.gg:17210

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ratka.exe
    "C:\Users\Admin\AppData\Local\Temp\ratka.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ratka.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ratka.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:456
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:1124
    • C:\Users\Admin\AppData\Local\Temp\tnxdsj.exe
      "C:\Users\Admin\AppData\Local\Temp\tnxdsj.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Windows\SysWOW64\reg.exe
          REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4116
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x50c 0x504
    1⤵
      PID:2932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3eb3833f769dd890afc295b977eab4b4

      SHA1

      e857649b037939602c72ad003e5d3698695f436f

      SHA256

      c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

      SHA512

      c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      60b3262c3163ee3d466199160b9ed07d

      SHA1

      994ece4ea4e61de0be2fdd580f87e3415f9e1ff6

      SHA256

      e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb

      SHA512

      081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      c238412481a146ab11982ee82490777c

      SHA1

      61451087cbd22daf63c18b6c3c939fe0952f27c3

      SHA256

      25f1c3a4b36ae44eb159193c17cc953ae3fa576928f2384865ab837a964bd9f2

      SHA512

      4ee702b05336364af8cb89a6dd162b9404a8307c5fef96b7af82e8db55459b65b0ce1ce6f6e3018aa213a73f42ba5dc80d8550e45baf756ef0b8b8459e7f9f9b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      d107add3b43194a9c5aa94a664139b0e

      SHA1

      611be48fb978b9c8becfeae1b544fd7a6a3b70c5

      SHA256

      3c34a437d16805b6a658b61bcba4a3ee1d415348f03de0614a2c9a2b43e6b85c

      SHA512

      5a3f317ab6baa429084d09a357f8a81d2b045d35bb820ce670f5645877677c315a3739a90af8c2c273c17c730c9d99695d16ac95a981f8649299f756dd840500

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rbgu1zf1.n10.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tnxdsj.exe

      Filesize

      63KB

      MD5

      2cf51977ed60a9a59d29a72075ce52ad

      SHA1

      960e40eaa8445c0049d11f97abba7f4b465ad4d5

      SHA256

      64735679e70b0d6e67198c28df11cf449dc114df01f6c336d61a9da39448f853

      SHA512

      bfcad9e99ff0dfd2cd917b8160cccab3710ed9974a6c15ea7dd1b0db965a51eec5ac588a87c4bab37af60504a3deb4f11de0a4d93a0c3648673b0dc0824646ad

    • memory/1904-59-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/1904-60-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/1904-88-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/1904-83-0x000000001B280000-0x000000001B30E000-memory.dmp

      Filesize

      568KB

    • memory/1904-1-0x0000000000500000-0x000000000051A000-memory.dmp

      Filesize

      104KB

    • memory/1904-62-0x000000001B1A0000-0x000000001B1AC000-memory.dmp

      Filesize

      48KB

    • memory/1904-0-0x00007FFBAB883000-0x00007FFBAB885000-memory.dmp

      Filesize

      8KB

    • memory/1904-42-0x00007FFBAB883000-0x00007FFBAB885000-memory.dmp

      Filesize

      8KB

    • memory/3532-2-0x0000020FCCB20000-0x0000020FCCB42000-memory.dmp

      Filesize

      136KB

    • memory/3532-12-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/3532-15-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/3532-13-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/3532-14-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/3532-19-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/3532-16-0x00007FFBAB880000-0x00007FFBAC342000-memory.dmp

      Filesize

      10.8MB

    • memory/4740-77-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB