Analysis
-
max time kernel
59s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 20:23
General
-
Target
uil.exe
-
Size
34KB
-
MD5
9a27af6e5ad0be342404fc36327274b9
-
SHA1
fef9c5b16c357ce08e5146c751821a6bb635f5fa
-
SHA256
19b4961b0fdcc4e320a6f2becd59f5918fc727db685140f64413a82f9235c962
-
SHA512
811e46e0091b05d281b3d0bb1cd39278b4c20b606620be6de924b7936673d548145fb953b020ce08462f603fa59942762ec6894e7d4770a9307290b77965f56d
-
SSDEEP
768:MiNxtIWYUcWXNmFdnf1COFy9jvOjhq/UZe:/xt3cWXYzzFy9jvOjkMZe
Malware Config
Extracted
xworm
5.0
gLXBFwOrGsx6hRJl
-
Install_directory
%AppData%
-
install_file
Edgeupdater.exe
-
pastebin_url
https://pastebin.com/raw/MNz8CDNG
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3408-1-0x00000000008A0000-0x00000000008AE000-memory.dmp family_xworm behavioral1/files/0x000400000001e64b-23.dat family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Edgeupdater.lnk uil.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Edgeupdater.lnk uil.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 pastebin.com 27 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3408 uil.exe Token: SeDebugPrivilege 4744 taskmgr.exe Token: SeSystemProfilePrivilege 4744 taskmgr.exe Token: SeCreateGlobalPrivilege 4744 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe 4744 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uil.exe"C:\Users\Admin\AppData\Local\Temp\uil.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD59a27af6e5ad0be342404fc36327274b9
SHA1fef9c5b16c357ce08e5146c751821a6bb635f5fa
SHA25619b4961b0fdcc4e320a6f2becd59f5918fc727db685140f64413a82f9235c962
SHA512811e46e0091b05d281b3d0bb1cd39278b4c20b606620be6de924b7936673d548145fb953b020ce08462f603fa59942762ec6894e7d4770a9307290b77965f56d
-
Filesize
793B
MD5a6397f58116fd30cd7995f7fc279be23
SHA1eef57d8f5daafe31d360a39a208b79f2e6ed1acb
SHA2561f5c09e527d2d0a715719ab7e2e76605d30ac23cf50717918c9cd8cd4bd3686f
SHA51267c3e6495e0c97cd525cfbcbba5dad235ea1db8f4c40c21631977e0e02670d83680be6e61f8fba46e1d76272219ef20d8a92e3029d0158372a79efe4f95ae4b0