Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
3.0MB
-
MD5
bff87092bbbb8b265f9109351bb705b4
-
SHA1
f77384b9700f4899eb9b6e973a3f67258b8b38a1
-
SHA256
746c77a58163dd078211c86687ae3a7d8b3af1cb948983a8f4f7ce2167d22dad
-
SHA512
04acf2774bc60acfb7506e32925acd33c1f9fffd4e0f903858172ab9c892203489a98874ef441f6cc70053f51bc737d9dd719d0b5f72e9e8f43c40b1d223ec0e
-
SSDEEP
49152:OQJmPAp/HK6UBdnBwpirpcWBpfk2nQdHQrAVbJ432MuMd2jPEa:1mG/HKBBNfco8qisAw3gMYj
Malware Config
Extracted
xworm
127.0.0.1:7000
google-rocks.gl.at.ply.gg:7000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000800000001878c-11.dat family_xworm behavioral1/memory/3008-14-0x0000000000D30000-0x0000000000D4A000-memory.dmp family_xworm behavioral1/memory/2912-66-0x0000000000300000-0x000000000031A000-memory.dmp family_xworm behavioral1/memory/2176-69-0x0000000000080000-0x000000000009A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2772 powershell.exe 2720 powershell.exe 2680 powershell.exe 2044 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Solara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Solara.exe -
Executes dropped EXE 5 IoCs
pid Process 2108 Bootstrapper.exe 3008 Solara.exe 1208 Process not Found 2912 svchost.exe 2176 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 BootstrapperNew.exe 1208 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2772 powershell.exe 2720 powershell.exe 2680 powershell.exe 2044 powershell.exe 3008 Solara.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3008 Solara.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 3008 Solara.exe Token: SeDebugPrivilege 2912 svchost.exe Token: SeDebugPrivilege 2176 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3008 Solara.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2108 2112 BootstrapperNew.exe 30 PID 2112 wrote to memory of 2108 2112 BootstrapperNew.exe 30 PID 2112 wrote to memory of 2108 2112 BootstrapperNew.exe 30 PID 2112 wrote to memory of 3008 2112 BootstrapperNew.exe 31 PID 2112 wrote to memory of 3008 2112 BootstrapperNew.exe 31 PID 2112 wrote to memory of 3008 2112 BootstrapperNew.exe 31 PID 3008 wrote to memory of 2772 3008 Solara.exe 32 PID 3008 wrote to memory of 2772 3008 Solara.exe 32 PID 3008 wrote to memory of 2772 3008 Solara.exe 32 PID 3008 wrote to memory of 2720 3008 Solara.exe 34 PID 3008 wrote to memory of 2720 3008 Solara.exe 34 PID 3008 wrote to memory of 2720 3008 Solara.exe 34 PID 3008 wrote to memory of 2680 3008 Solara.exe 37 PID 3008 wrote to memory of 2680 3008 Solara.exe 37 PID 3008 wrote to memory of 2680 3008 Solara.exe 37 PID 3008 wrote to memory of 2044 3008 Solara.exe 39 PID 3008 wrote to memory of 2044 3008 Solara.exe 39 PID 3008 wrote to memory of 2044 3008 Solara.exe 39 PID 3008 wrote to memory of 1956 3008 Solara.exe 41 PID 3008 wrote to memory of 1956 3008 Solara.exe 41 PID 3008 wrote to memory of 1956 3008 Solara.exe 41 PID 2228 wrote to memory of 2912 2228 taskeng.exe 44 PID 2228 wrote to memory of 2912 2228 taskeng.exe 44 PID 2228 wrote to memory of 2912 2228 taskeng.exe 44 PID 2228 wrote to memory of 2176 2228 taskeng.exe 45 PID 2228 wrote to memory of 2176 2228 taskeng.exe 45 PID 2228 wrote to memory of 2176 2228 taskeng.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Solara.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F5FC80A3-71D9-4061-9819-361DD5E612C5} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD526b3ebae00dafdc80bd84c31c7f0e553
SHA155a47080a93ad6b69069ee3a58d8c2ffbbf20861
SHA25668ead7f94d34fa9e8eef5016506da5a1d3e2cdb513f02880785b535051a88b52
SHA5120c99e08108b6e0887d755fb1e3e93e69736a2b3b6636a0c4a372b18feb6a4cb749f46b1a9dac16d993e955c052ca9056efb79b72b4fb9c71b800f48604a26905
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55d49fd78b57ebe2779f18e0ae6e948c6
SHA114c9ed40f0911f347ee62ac7e56adaf4a19e97e2
SHA25671c86d1213fd64edcfce6e92c3e6e08e0a9f297640be4cc6ca69a8cd187c0ba9
SHA512aea3723828c77cb229ac4a765b1433388440b9bf399cb568825a323f6501a5618b07a321851269fdd26aa2dee5d0f79a274a0909074b8aba6b89686787566f59
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e