Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe
Resource
win7-20240903-en
General
-
Target
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe
-
Size
1.7MB
-
MD5
a378359637b5d95388debc25f568ce9f
-
SHA1
1d88e287db2b9bb659688d8b79e418d7504c3145
-
SHA256
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
SHA512
b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1
-
SSDEEP
49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW
Malware Config
Extracted
xworm
set-reduces.gl.at.ply.gg:28950
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2700-22-0x0000000000090000-0x0000000000412000-memory.dmp family_xworm behavioral1/memory/2700-28-0x0000000000090000-0x0000000000412000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 1060 Bootstraper.exe 2700 BootstraperNew_protected.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2700 BootstraperNew_protected.exe 2700 BootstraperNew_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstraperNew_protected.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 BootstraperNew_protected.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 BootstraperNew_protected.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 BootstraperNew_protected.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1060 1644 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe 31 PID 1644 wrote to memory of 1060 1644 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe 31 PID 1644 wrote to memory of 1060 1644 ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe 31 PID 1060 wrote to memory of 2700 1060 Bootstraper.exe 32 PID 1060 wrote to memory of 2700 1060 Bootstraper.exe 32 PID 1060 wrote to memory of 2700 1060 Bootstraper.exe 32 PID 1060 wrote to memory of 2700 1060 Bootstraper.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe"C:\Users\Admin\AppData\Local\Temp\ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Windows\System32\Bootstraper.exe"C:\Users\Admin\AppData\Local\Temp\Windows\System32\Bootstraper.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\BootstraperNew_protected.exe"C:\Users\Admin\AppData\Local\Temp\BootstraperNew_protected.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52a1de04ba5a824f8ac57894935bc6d27
SHA17cf6f2d735ba9f1a536fc8453f87e77d34c1a5be
SHA256ba3b1c382e24ebd6d37d2c7734720c6aa764f562a25d7dcbc7e3a1595afaa1d4
SHA5123c62fa6792b1480ac0f3c200628992425616873d70ffcf675952adb7e4d9f77d034087148d5e2cd45871ec12fb6825a751d70d2e58302ce4843ac9f0def24378
-
Filesize
1.5MB
MD53ae688a1356c87103f12f78f36d44c7d
SHA12e4d0a10a3b00f6effa14fba95a075bcaae217fb
SHA256b2249f5105cc208e95d559ef92783eb1dc824fb6fca9a3596e6a0139161af502
SHA51229e6790c775dfbf31fd9b347b70dad61a2693bfbfa9fda75cb71922e9fd8900f451deb3fb02241b2992c93b24f1d10eb65fdd7e4f6a49948f35cc349ca269fb1