Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
CulMasterBot.exe
Resource
win7-20240903-en
General
-
Target
CulMasterBot.exe
-
Size
758KB
-
MD5
2417767a8d9740d0c304bb72ed185b67
-
SHA1
21bbd4db761968bc1fb0708767ef10814dd41868
-
SHA256
7f8878badd48f61c9af71d304ee2cc5d2e580a92816b721a206d2889063f4b81
-
SHA512
c0b947608909829271cefb797017933a02d55a378eb6f70ecba20c3d86658c46fb58a515e90d32419cfdeab63d7e166fc699cbf0bfba8b5135301b5d8b9f63ae
-
SSDEEP
12288:7fQqQuCmgRYeJIDdrd+pQkKVn6nY4u5fsR1b:7fQqQuiJIprdOQJn6nbuiF
Malware Config
Extracted
xworm
5.0
176.65.134.31:7000
6H3f8cuSC1IGC8kj
-
install_file
USB.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2720-40-0x0000000000550000-0x000000000055E000-memory.dmp disable_win_def -
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/1160-10-0x0000000000090000-0x000000000009E000-memory.dmp family_xworm behavioral1/memory/1160-12-0x0000000000090000-0x000000000009E000-memory.dmp family_xworm behavioral1/memory/2720-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2720-33-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2720-30-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 2364 uttudv.exe -
Loads dropped DLL 2 IoCs
pid Process 2720 InstallUtil.exe 2720 InstallUtil.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1812 set thread context of 2720 1812 CulMasterBot.exe 32 PID 2364 set thread context of 860 2364 uttudv.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CulMasterBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uttudv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 860 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1812 CulMasterBot.exe 1812 CulMasterBot.exe 1812 CulMasterBot.exe 1812 CulMasterBot.exe 1812 CulMasterBot.exe 2364 uttudv.exe 2364 uttudv.exe 2364 uttudv.exe 2364 uttudv.exe 2364 uttudv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1812 CulMasterBot.exe Token: SeDebugPrivilege 2720 InstallUtil.exe Token: SeDebugPrivilege 2364 uttudv.exe Token: SeDebugPrivilege 860 InstallUtil.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 1160 1812 CulMasterBot.exe 30 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 1812 wrote to memory of 2720 1812 CulMasterBot.exe 32 PID 2720 wrote to memory of 2364 2720 InstallUtil.exe 34 PID 2720 wrote to memory of 2364 2720 InstallUtil.exe 34 PID 2720 wrote to memory of 2364 2720 InstallUtil.exe 34 PID 2720 wrote to memory of 2364 2720 InstallUtil.exe 34 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35 PID 2364 wrote to memory of 860 2364 uttudv.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\CulMasterBot.exe"C:\Users\Admin\AppData\Local\Temp\CulMasterBot.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\uttudv.exe"C:\Users\Admin\AppData\Local\Temp\uttudv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
882KB
MD50bf190d5229cd876dc398141addb4755
SHA183ad458b0c3ca248e7a05e83ceb39027138af3ac
SHA2568991a0fb032262c8392fdd13e8d0c0a9782dd73d11dfab93eb94505bd4145844
SHA512966a0e8dfbc5859e23bba8be932518614282579b1bb3cbca8aec7138f4b6de096ed230e44811fd6dc95304899898d451d202457457e38dfddaaf2834fbb69f53