Analysis
-
max time kernel
123s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
CulMasterBot.exe
Resource
win7-20240903-en
General
-
Target
CulMasterBot.exe
-
Size
758KB
-
MD5
2417767a8d9740d0c304bb72ed185b67
-
SHA1
21bbd4db761968bc1fb0708767ef10814dd41868
-
SHA256
7f8878badd48f61c9af71d304ee2cc5d2e580a92816b721a206d2889063f4b81
-
SHA512
c0b947608909829271cefb797017933a02d55a378eb6f70ecba20c3d86658c46fb58a515e90d32419cfdeab63d7e166fc699cbf0bfba8b5135301b5d8b9f63ae
-
SSDEEP
12288:7fQqQuCmgRYeJIDdrd+pQkKVn6nY4u5fsR1b:7fQqQuiJIprdOQJn6nbuiF
Malware Config
Extracted
xworm
5.0
176.65.134.31:7000
6H3f8cuSC1IGC8kj
-
install_file
USB.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4496-22-0x00000000060B0000-0x00000000060BE000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4496-13-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 3112 dgowya.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1320 set thread context of 4496 1320 CulMasterBot.exe 87 PID 3112 set thread context of 3992 3112 dgowya.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgowya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CulMasterBot.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3992 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1320 CulMasterBot.exe 1320 CulMasterBot.exe 1320 CulMasterBot.exe 4496 InstallUtil.exe 3112 dgowya.exe 3112 dgowya.exe 3112 dgowya.exe 3112 dgowya.exe 3112 dgowya.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1320 CulMasterBot.exe Token: SeDebugPrivilege 4496 InstallUtil.exe Token: SeDebugPrivilege 3112 dgowya.exe Token: SeDebugPrivilege 3992 InstallUtil.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 1320 wrote to memory of 4496 1320 CulMasterBot.exe 87 PID 4496 wrote to memory of 3112 4496 InstallUtil.exe 103 PID 4496 wrote to memory of 3112 4496 InstallUtil.exe 103 PID 4496 wrote to memory of 3112 4496 InstallUtil.exe 103 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104 PID 3112 wrote to memory of 3992 3112 dgowya.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\CulMasterBot.exe"C:\Users\Admin\AppData\Local\Temp\CulMasterBot.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\dgowya.exe"C:\Users\Admin\AppData\Local\Temp\dgowya.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
882KB
MD50bf190d5229cd876dc398141addb4755
SHA183ad458b0c3ca248e7a05e83ceb39027138af3ac
SHA2568991a0fb032262c8392fdd13e8d0c0a9782dd73d11dfab93eb94505bd4145844
SHA512966a0e8dfbc5859e23bba8be932518614282579b1bb3cbca8aec7138f4b6de096ed230e44811fd6dc95304899898d451d202457457e38dfddaaf2834fbb69f53