Analysis
-
max time kernel
20s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 02:45
General
-
Target
$R7DQTGG.exe
-
Size
197KB
-
MD5
23ae846b601cdfbc78da67bf61e265fa
-
SHA1
8104966ae762225d23df128b2cf8bde8145bbf01
-
SHA256
a67721023e1aea8b73d8614e6e29e5108152f510619516da1648dc03cb7de122
-
SHA512
7e002c88090b5468ceb186e68c5ae34ab8ab22782bbd33387d1c665dcc8770e25ae2fe7243fbd94dc5d2c277650a5d90961bef6ded616e9c6629a659494d1c36
-
SSDEEP
3072:CLq2PnaybVqQQK/Ec/OaW3JRUGKXs+S++7KFSbxeY+qDDrMI:eq2bpg8GqStKEbxI
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%AppData%
-
install_file
x69Microsoft Edge.exe
-
pastebin_url
https://pastebin.com/raw/zYgpCQBC
-
telegram
https://api.telegram.org/bot7322335748:AAEr-qkbNoi4AH-VkGzWTsoAJ0Jx3HkKwbk/sendMessage?chat_id=7763830849
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2916-1-0x0000000000F00000-0x0000000000F36000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2916 $R7DQTGG.exe Token: SeDebugPrivilege 4896 taskmgr.exe Token: SeSystemProfilePrivilege 4896 taskmgr.exe Token: SeCreateGlobalPrivilege 4896 taskmgr.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe 4896 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$R7DQTGG.exe"C:\Users\Admin\AppData\Local\Temp\$R7DQTGG.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4896