Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe
Resource
win7-20240903-en
General
-
Target
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe
-
Size
851KB
-
MD5
28badf3eb1aa6ce975fee86e6ec1dc14
-
SHA1
8f19c7dbdde308e463b0412d73ea7083b1bcc816
-
SHA256
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e
-
SHA512
eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e
-
SSDEEP
12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/5008-1351-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1860 created 3440 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 56 PID 3740 created 3440 3740 hoedhk.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Current.vbs hoedhk.exe -
Executes dropped EXE 3 IoCs
pid Process 3740 hoedhk.exe 756 wovkpg.exe 5396 hoedhk.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1860 set thread context of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 3740 set thread context of 5396 3740 hoedhk.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoedhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wovkpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoedhk.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 3740 hoedhk.exe 3740 hoedhk.exe 3740 hoedhk.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe Token: SeDebugPrivilege 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe Token: SeDebugPrivilege 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe Token: SeDebugPrivilege 756 wovkpg.exe Token: SeDebugPrivilege 3740 hoedhk.exe Token: SeDebugPrivilege 3740 hoedhk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5396 hoedhk.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 1860 wrote to memory of 5008 1860 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 96 PID 5008 wrote to memory of 756 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 110 PID 5008 wrote to memory of 756 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 110 PID 5008 wrote to memory of 756 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 110 PID 5008 wrote to memory of 3740 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 111 PID 5008 wrote to memory of 3740 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 111 PID 5008 wrote to memory of 3740 5008 7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe 111 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112 PID 3740 wrote to memory of 5396 3740 hoedhk.exe 112
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe"C:\Users\Admin\AppData\Local\Temp\7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe"C:\Users\Admin\AppData\Local\Temp\7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\wovkpg.exe"C:\Users\Admin\AppData\Local\Temp\wovkpg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\hoedhk.exe"C:\Users\Admin\AppData\Local\Temp\hoedhk.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\hoedhk.exe"C:\Users\Admin\AppData\Local\Temp\hoedhk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5396
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD54e2e8d017fd964e1baf7f78ba9a08e88
SHA1b201e8788cf604fb1d102be8c445b77741d5bed7
SHA256e68f29b178a29e1367254d2db2e13662c3c4fbaf182d833da96b6273b004a43f
SHA51294c9c374cfe197911d7e4b83cedcbd17007076332d06e8f42589d5b728ff1e7322f20619f43096c8ddeaf86088f2dd0def01e9f3c52e4eeb37db63e7b12d57cd
-
Filesize
321KB
MD5c3c9aef7cfa722fc253f76be54dd6b99
SHA185b20d6633eb532ce0fe3e104ab11a00c0092711
SHA2567ea7db477940441213110d458ebd748455f3894a5eef19597589f0448ccb002a
SHA5124b20899339b68b6c55fba925eed5d18c927da8be66f311d04cc199e70b5e743c345eabe6c673557f426422bfa1143da7da352712b39d5d55a3a07e8b0ef222b1