Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 07:48
Behavioral task
behavioral1
Sample
b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe
Resource
win10v2004-20250217-en
General
-
Target
b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe
-
Size
68KB
-
MD5
9821e1e4aacd033130ebdc73c37e958e
-
SHA1
2971d7117d155309f860740d8edfb25f7b4dc947
-
SHA256
b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c
-
SHA512
a1eed0001124e21ad5ed1d9b010ab7fea175c8d5ea38366befe35c834e564995c919ad091fe54462abd2db0c5612cefcc047b852ce6cccd0b3ccd5534824bc03
-
SSDEEP
1536:R4BEioJRb0gPtcsur5Wfb62+496LvfOgMR5V:R4BEDb0gasur5Eb6y8OgMDV
Malware Config
Extracted
xworm
4.tcp.ngrok.io:11205
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2532-1-0x0000000000940000-0x0000000000958000-memory.dmp family_xworm behavioral1/files/0x000a0000000120f9-8.dat family_xworm behavioral1/memory/2608-16-0x00000000012C0000-0x00000000012D8000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.lnk b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.lnk b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Executes dropped EXE 2 IoCs
pid Process 2608 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe 1940 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c = "C:\\Users\\Admin\\AppData\\Roaming\\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe" b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 6 4.tcp.ngrok.io 70 4.tcp.ngrok.io 106 4.tcp.ngrok.io 114 4.tcp.ngrok.io 129 4.tcp.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe Token: SeDebugPrivilege 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe Token: SeDebugPrivilege 2608 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe Token: SeDebugPrivilege 1940 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2372 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe 30 PID 2532 wrote to memory of 2372 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe 30 PID 2532 wrote to memory of 2372 2532 b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe 30 PID 2640 wrote to memory of 2608 2640 taskeng.exe 34 PID 2640 wrote to memory of 2608 2640 taskeng.exe 34 PID 2640 wrote to memory of 2608 2640 taskeng.exe 34 PID 2640 wrote to memory of 1940 2640 taskeng.exe 35 PID 2640 wrote to memory of 1940 2640 taskeng.exe 35 PID 2640 wrote to memory of 1940 2640 taskeng.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe"C:\Users\Admin\AppData\Local\Temp\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c" /tr "C:\Users\Admin\AppData\Roaming\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2372
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F982A603-AE4A-4B44-BD01-D3747560998F} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exeC:\Users\Admin\AppData\Roaming\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Users\Admin\AppData\Roaming\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exeC:\Users\Admin\AppData\Roaming\b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD59821e1e4aacd033130ebdc73c37e958e
SHA12971d7117d155309f860740d8edfb25f7b4dc947
SHA256b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c
SHA512a1eed0001124e21ad5ed1d9b010ab7fea175c8d5ea38366befe35c834e564995c919ad091fe54462abd2db0c5612cefcc047b852ce6cccd0b3ccd5534824bc03