Analysis
-
max time kernel
6s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 14:58
Behavioral task
behavioral1
Sample
Nincs megerősítve 50667.exe
Resource
win7-20241023-en
Errors
General
-
Target
Nincs megerősítve 50667.exe
-
Size
75KB
-
MD5
9fb584a7f293aa900e682cabe3faefcc
-
SHA1
043d316155bf973a2bb8f1d4ed29c2db7568854b
-
SHA256
22adf85ad4591d2c4871440fe7ed023575be15e202ca0abe54c17c77cddca990
-
SHA512
5c77d9d656357416b0663b437104702fcc3060ec1612726d07ee557b74f0c845725435a69c8090c20f6410e6ef4899d1347f201365b493a7ed739b9057b20b5a
-
SSDEEP
1536:GuIFQo65XTfSBtcLuJ5Hp+b5oFN7aS4V2EOOo/Z3VI8Ev:GuxJYL+b5z1OO2Z3VInv
Malware Config
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2152-1-0x0000000000C80000-0x0000000000C9A000-memory.dmp family_xworm -
Xworm family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2152 Nincs megerősítve 50667.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2152 Nincs megerősítve 50667.exe Token: SeDebugPrivilege 2152 Nincs megerősítve 50667.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2152 Nincs megerősítve 50667.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2532 1416 chrome.exe 31 PID 1416 wrote to memory of 2532 1416 chrome.exe 31 PID 1416 wrote to memory of 2532 1416 chrome.exe 31 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 3008 1416 chrome.exe 33 PID 1416 wrote to memory of 2824 1416 chrome.exe 34 PID 1416 wrote to memory of 2824 1416 chrome.exe 34 PID 1416 wrote to memory of 2824 1416 chrome.exe 34 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35 PID 1416 wrote to memory of 2896 1416 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nincs megerősítve 50667.exe"C:\Users\Admin\AppData\Local\Temp\Nincs megerősítve 50667.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feefbe9758,0x7feefbe9768,0x7feefbe97782⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:22⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:12⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1532 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:22⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1368 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3444 --field-trial-handle=1348,i,6506447650534173270,14567340262932318894,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2504
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1052
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD523ff46339e9ad1f08af1125bd87c6d77
SHA12a07d1ebbe6b5511bacc04848ff8e93d0ecae504
SHA256b58b29f6e55082e1796dec6541d56c524ab245a3edfa879de45062879ca870e1
SHA512b4b806629979055ff4b82e99b4163544904f165917d3c4d2d665b627fabaa88cee003daf6226e1c6bf1607e8275595a1ddeac3d44cf7f37777693edfd608e400
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
5KB
MD5109205d9d4d3e7c4cfc0d9cc35bb734f
SHA116e0e6275ffe258cebf709577aae16a7fbc0d8ec
SHA2564506a1892b49a3276c5f2d056fe7685d4ecc96f64d1481d0ee2dfbaa61a935a4
SHA5122fcfba7e92520191bc6e76384630b0215360c2cb1696035f50146f85d6398c8de3899ca853cb55da3a865772c9727ccf58959344b9cbc1b3411552c8c5bb65ba
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
360KB
MD5c5a1912817dcdafd15ac189f351878e4
SHA1890166c1b4169b8a40be76ca0bf2899326e966ff
SHA256ab5be2b0c57a3d4c034e23cb08065f63ca7d1c88573e2453065fd9b7dd6dd5a3
SHA512b14f30e502778139256bce8257052c2927310efb91e89837f120545afa13861e81e016f162f13a3edc8abf9b46a85aa7a49d077aab83ecca199c2156ffb8b170