Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
tergdfgdfg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tergdfgdfg.exe
Resource
win10v2004-20250217-en
General
-
Target
tergdfgdfg.exe
-
Size
80KB
-
MD5
9410280381c7972ba775e13d094a87e0
-
SHA1
3389d7bf5fdc0c613bb130da42d76968b221392d
-
SHA256
f14d1d27a20ad79684026a18395389354d6dc0e529d2d795bf80e3b66f76913b
-
SHA512
2c829e655ac71245f8258015556910b6f9eb2988c9e1bb1ecafedee7406b13a10f586f5d3cdecdc374fd8763d538eb2cf84db3a98aec6076629d87bcf998e5b9
-
SSDEEP
1536:ccrBb0z39BE4SNMZlvaE67897ymsDKM88wEaCnbeHsy/yim/1y1ejY6yFOBa:zrBbcnCMZlvaZM2msWxEleJ/yjgf6yFD
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1192-5-0x0000000003DA0000-0x0000000003DB2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2872 powershell.exe 2648 powershell.exe 2380 powershell.exe 2784 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SubDir.lnk Explorer.EXE File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SubDir.lnk Explorer.EXE -
Executes dropped EXE 2 IoCs
pid Process 2464 SubDir.exe 1992 SubDir.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 Explorer.EXE 2652 taskeng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\SubDir = "C:\\Users\\Admin\\AppData\\Roaming\\SubDir.exe" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyApplication = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tergdfgdfg.exe" tergdfgdfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 tergdfgdfg.exe 2380 powershell.exe 2784 powershell.exe 2872 powershell.exe 2648 powershell.exe 1192 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1192 Explorer.EXE Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 1192 Explorer.EXE Token: SeShutdownPrivilege 1192 Explorer.EXE Token: SeShutdownPrivilege 1192 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1192 2072 tergdfgdfg.exe 21 PID 1192 wrote to memory of 2380 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2380 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2380 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2784 1192 Explorer.EXE 33 PID 1192 wrote to memory of 2784 1192 Explorer.EXE 33 PID 1192 wrote to memory of 2784 1192 Explorer.EXE 33 PID 1192 wrote to memory of 2872 1192 Explorer.EXE 35 PID 1192 wrote to memory of 2872 1192 Explorer.EXE 35 PID 1192 wrote to memory of 2872 1192 Explorer.EXE 35 PID 1192 wrote to memory of 2648 1192 Explorer.EXE 37 PID 1192 wrote to memory of 2648 1192 Explorer.EXE 37 PID 1192 wrote to memory of 2648 1192 Explorer.EXE 37 PID 1192 wrote to memory of 780 1192 Explorer.EXE 39 PID 1192 wrote to memory of 780 1192 Explorer.EXE 39 PID 1192 wrote to memory of 780 1192 Explorer.EXE 39 PID 2652 wrote to memory of 2464 2652 taskeng.exe 44 PID 2652 wrote to memory of 2464 2652 taskeng.exe 44 PID 2652 wrote to memory of 2464 2652 taskeng.exe 44 PID 2652 wrote to memory of 1992 2652 taskeng.exe 47 PID 2652 wrote to memory of 1992 2652 taskeng.exe 47 PID 2652 wrote to memory of 1992 2652 taskeng.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\tergdfgdfg.exe"C:\Users\Admin\AppData\Local\Temp\tergdfgdfg.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Explorer.EXE'2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Explorer.EXE'2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SubDir.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SubDir.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SubDir" /tr "C:\Users\Admin\AppData\Roaming\SubDir.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:780
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E6AE421E-2A7C-4C99-8FB9-90CDBADCCD5B} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\SubDir.exeC:\Users\Admin\AppData\Roaming\SubDir.exe2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Users\Admin\AppData\Roaming\SubDir.exeC:\Users\Admin\AppData\Roaming\SubDir.exe2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:2412
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:680
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FT7EKE3BP8ETSXJJ8MEW.temp
Filesize7KB
MD5cb3c6d90e3f925702b017af21ae6ae80
SHA1938d62c11b349795048711c32edaccde74d83ef6
SHA2562ea2ca96e447b31034fdbcc8a3720a863626eb64f204aaac7bc07d21aa80a007
SHA512b48f824c7a9f81d8a5208983a7a1605edd5fef05d31564863199fc57f9d7b2c2f71ad777dfabad3ce79a0732222f3e42a783a759b7dcd63f217e3c0fbe857908
-
Filesize
2.7MB
MD5ac4c51eb24aa95b77f705ab159189e24
SHA14583daf9442880204730fb2c8a060430640494b1
SHA2566a671b92a69755de6fd063fcbe4ba926d83b49f78c42dbaeed8cdb6bbc57576a
SHA512011bfe19bd15dcc0f9850575e20d7f2c01160ec98ba461ad59a51b9417049e6475648b9056990247699624b080cf609ec7b5409231cfb46a012d723f7db08d81