Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 20:25
Behavioral task
behavioral1
Sample
shooting the oops.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
shooting the oops.exe
Resource
win10v2004-20250217-en
General
-
Target
shooting the oops.exe
-
Size
39KB
-
MD5
c9bd74622a8a1531b93a03ac9c3ba67d
-
SHA1
b0354cf79ae41e2320d888a38d1c62915bb79445
-
SHA256
c750a86768228dbb5143efaf9bf1fc980129ed2b51be5bb40ef1db2dd41e9c05
-
SHA512
6bacb2e43ac5c3d8d2922091f1e263ccfaae3317b0eaae80f973e1344fcb3ce07091712edaa5ab0f9518d08b963c39b13ef085592dc6410509a21fefcab52263
-
SSDEEP
768:vifC8qTvhE58LEIDPiKuukR7LH3tTfFWPt9eE56cOMh+alE:viTqTvhOeEIbiKuumnNFe9eE56cOME3
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
M6KBt08Rxl7gnMQb
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2516-1-0x0000000000C60000-0x0000000000C70000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1100 powershell.exe 2716 powershell.exe 2744 powershell.exe 2776 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\THE BLACKS.lnk shooting the oops.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\THE BLACKS.lnk shooting the oops.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\THE BLACKS = "C:\\Users\\Admin\\AppData\\Roaming\\THE BLACKS" shooting the oops.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1100 powershell.exe 2716 powershell.exe 2744 powershell.exe 2776 powershell.exe 2516 shooting the oops.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2516 shooting the oops.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2516 shooting the oops.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2516 shooting the oops.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1100 2516 shooting the oops.exe 30 PID 2516 wrote to memory of 1100 2516 shooting the oops.exe 30 PID 2516 wrote to memory of 1100 2516 shooting the oops.exe 30 PID 2516 wrote to memory of 2716 2516 shooting the oops.exe 32 PID 2516 wrote to memory of 2716 2516 shooting the oops.exe 32 PID 2516 wrote to memory of 2716 2516 shooting the oops.exe 32 PID 2516 wrote to memory of 2744 2516 shooting the oops.exe 34 PID 2516 wrote to memory of 2744 2516 shooting the oops.exe 34 PID 2516 wrote to memory of 2744 2516 shooting the oops.exe 34 PID 2516 wrote to memory of 2776 2516 shooting the oops.exe 36 PID 2516 wrote to memory of 2776 2516 shooting the oops.exe 36 PID 2516 wrote to memory of 2776 2516 shooting the oops.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe"C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\shooting the oops.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'shooting the oops.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\THE BLACKS'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'THE BLACKS'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD515d41dfea6e99f4018fb2d720b2cd7b1
SHA1b43b6ecc1fa1b5a452e6c96dca71a24b91ba58f7
SHA2565cea0defd6b8025572486475ed9a59094d5a41912216d5988764203baf959ece
SHA512c68f060e1ad8e05bb7dbdbd486c2d482fd16f3c557603deeaa059affc84e73c8dd27595f57b2eca9d7ffcbd9cc3e488a37578575c6cd6aeb4f0e51014b923033