Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 20:20
Behavioral task
behavioral1
Sample
shooting the oops.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
shooting the oops.exe
Resource
win10v2004-20250217-en
General
-
Target
shooting the oops.exe
-
Size
39KB
-
MD5
c9bd74622a8a1531b93a03ac9c3ba67d
-
SHA1
b0354cf79ae41e2320d888a38d1c62915bb79445
-
SHA256
c750a86768228dbb5143efaf9bf1fc980129ed2b51be5bb40ef1db2dd41e9c05
-
SHA512
6bacb2e43ac5c3d8d2922091f1e263ccfaae3317b0eaae80f973e1344fcb3ce07091712edaa5ab0f9518d08b963c39b13ef085592dc6410509a21fefcab52263
-
SSDEEP
768:vifC8qTvhE58LEIDPiKuukR7LH3tTfFWPt9eE56cOMh+alE:viTqTvhOeEIbiKuumnNFe9eE56cOME3
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
M6KBt08Rxl7gnMQb
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2492-1-0x00000000000F0000-0x0000000000100000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2528 powershell.exe 1752 powershell.exe 2480 powershell.exe 2828 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\THE BLACKS.lnk shooting the oops.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\THE BLACKS.lnk shooting the oops.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\THE BLACKS = "C:\\Users\\Admin\\AppData\\Roaming\\THE BLACKS" shooting the oops.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 powershell.exe 2480 powershell.exe 2828 powershell.exe 2528 powershell.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe 2492 shooting the oops.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2492 shooting the oops.exe Token: SeDebugPrivilege 1752 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2492 shooting the oops.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 shooting the oops.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1752 2492 shooting the oops.exe 30 PID 2492 wrote to memory of 1752 2492 shooting the oops.exe 30 PID 2492 wrote to memory of 1752 2492 shooting the oops.exe 30 PID 2492 wrote to memory of 2480 2492 shooting the oops.exe 32 PID 2492 wrote to memory of 2480 2492 shooting the oops.exe 32 PID 2492 wrote to memory of 2480 2492 shooting the oops.exe 32 PID 2492 wrote to memory of 2828 2492 shooting the oops.exe 34 PID 2492 wrote to memory of 2828 2492 shooting the oops.exe 34 PID 2492 wrote to memory of 2828 2492 shooting the oops.exe 34 PID 2492 wrote to memory of 2528 2492 shooting the oops.exe 36 PID 2492 wrote to memory of 2528 2492 shooting the oops.exe 36 PID 2492 wrote to memory of 2528 2492 shooting the oops.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe"C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'shooting the oops.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\THE BLACKS'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'THE BLACKS'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50541d7c5c986ba188d053c86b9c87791
SHA11dcf86dce14aa4c90773137e94f82e37ddb8cc18
SHA25605e56bf16bfe1f5f09f53b143c43dd61d2f2fde224dad842df09daaa70a42c1c
SHA5129cbe14063462f821b6d649c30689ca91d9b04496abb32338bf73338c76b05f1eae18aa3f860bde4796d00b8e045548682237698935c6923557aafadbf84b07d9