Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 12:22
Behavioral task
behavioral1
Sample
injector-helper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
injector-helper.exe
Resource
win10v2004-20250217-en
General
-
Target
injector-helper.exe
-
Size
184KB
-
MD5
c777067925c4275efccd6e31750b2a4d
-
SHA1
52259a1bf97340490e0208145bb8c666e07c31f9
-
SHA256
435011ebed0c301de1847935c54d9b80a4c279e380413d207febd895e8164e3f
-
SHA512
0ad92779cc0073089d8c7c252eab1ff5e8ddafab9aa6a0391c41625a40a6ca46dd228bd3a36e0aaa399bd89b22e7fb09bc6bcb2f27c7e5f89b75a5798b22ce85
-
SSDEEP
3072:P567FmwoIb5iz+bIOVMQMGxO1VjBz65/M6If+3Js+3JFkKeTno:P5im6iKbYjxBt25
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/kADeGNZE
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2096-1-0x0000000000F40000-0x0000000000F74000-memory.dmp family_xworm behavioral1/memory/2040-36-0x00000000000F0000-0x0000000000124000-memory.dmp family_xworm behavioral1/files/0x000d000000012281-35.dat family_xworm behavioral1/memory/1476-40-0x0000000000EE0000-0x0000000000F14000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2488 powershell.exe 2700 powershell.exe 2968 powershell.exe 1136 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk injector-helper.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk injector-helper.exe -
Executes dropped EXE 3 IoCs
pid Process 2040 svchost.exe 1476 svchost.exe 2408 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" injector-helper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2488 powershell.exe 2700 powershell.exe 2968 powershell.exe 1136 powershell.exe 2096 injector-helper.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2096 injector-helper.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 2096 injector-helper.exe Token: SeDebugPrivilege 2040 svchost.exe Token: SeDebugPrivilege 1476 svchost.exe Token: SeDebugPrivilege 2408 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2096 injector-helper.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2488 2096 injector-helper.exe 31 PID 2096 wrote to memory of 2488 2096 injector-helper.exe 31 PID 2096 wrote to memory of 2488 2096 injector-helper.exe 31 PID 2096 wrote to memory of 2700 2096 injector-helper.exe 33 PID 2096 wrote to memory of 2700 2096 injector-helper.exe 33 PID 2096 wrote to memory of 2700 2096 injector-helper.exe 33 PID 2096 wrote to memory of 2968 2096 injector-helper.exe 35 PID 2096 wrote to memory of 2968 2096 injector-helper.exe 35 PID 2096 wrote to memory of 2968 2096 injector-helper.exe 35 PID 2096 wrote to memory of 1136 2096 injector-helper.exe 37 PID 2096 wrote to memory of 1136 2096 injector-helper.exe 37 PID 2096 wrote to memory of 1136 2096 injector-helper.exe 37 PID 2096 wrote to memory of 2632 2096 injector-helper.exe 39 PID 2096 wrote to memory of 2632 2096 injector-helper.exe 39 PID 2096 wrote to memory of 2632 2096 injector-helper.exe 39 PID 2864 wrote to memory of 2040 2864 taskeng.exe 42 PID 2864 wrote to memory of 2040 2864 taskeng.exe 42 PID 2864 wrote to memory of 2040 2864 taskeng.exe 42 PID 2864 wrote to memory of 1476 2864 taskeng.exe 44 PID 2864 wrote to memory of 1476 2864 taskeng.exe 44 PID 2864 wrote to memory of 1476 2864 taskeng.exe 44 PID 2864 wrote to memory of 2408 2864 taskeng.exe 46 PID 2864 wrote to memory of 2408 2864 taskeng.exe 46 PID 2864 wrote to memory of 2408 2864 taskeng.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\injector-helper.exe"C:\Users\Admin\AppData\Local\Temp\injector-helper.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\injector-helper.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector-helper.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {39988B6A-CC8D-46FF-9808-075380033844} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5c777067925c4275efccd6e31750b2a4d
SHA152259a1bf97340490e0208145bb8c666e07c31f9
SHA256435011ebed0c301de1847935c54d9b80a4c279e380413d207febd895e8164e3f
SHA5120ad92779cc0073089d8c7c252eab1ff5e8ddafab9aa6a0391c41625a40a6ca46dd228bd3a36e0aaa399bd89b22e7fb09bc6bcb2f27c7e5f89b75a5798b22ce85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UZS5M1WJGDWEJ1OPD12O.temp
Filesize7KB
MD5b9a71158b56e8d651724bf7beaf9161f
SHA149e3107fed3ea119b0613526d32bc4ba443800bb
SHA256dc40a571c8311612e7ad82b49dfdcd55eecd1d3f143426b5da370b9f0c6f0979
SHA512f01a484f9606c59177d90ec2424786c973fbf16146d6cfa77550109f8925295e2b6547db6f487841c62989d4d93b932dc57dbc5924621d9b64e5458d6428fa8d