Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
PO#GREEN AURA.exe
Resource
win7-20240903-en
General
-
Target
PO#GREEN AURA.exe
-
Size
103KB
-
MD5
71e0c8f71b15046709d4e250086346a4
-
SHA1
9536f9bc5e10128074cdd2597e970b29d44c4bcd
-
SHA256
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
-
SHA512
15cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba
-
SSDEEP
1536:EfDrLD7tmNEoCfjSbHb7RqWYZvZqF3c9MwsUSEJxY87d17:EHLD7Ewub70Wmy3VwQGxY87r7
Malware Config
Extracted
xworm
5.0
QIUpnGyi0OFuIMGO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2020-1349-0x0000000000700000-0x000000000070E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1640 created 3368 1640 PO#GREEN AURA.exe 56 PID 4044 created 3368 4044 fteaum.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation PO#GREEN AURA.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs PO#GREEN AURA.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DaylightName.vbs fteaum.exe -
Executes dropped EXE 2 IoCs
pid Process 4044 fteaum.exe 3632 fteaum.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1640 set thread context of 2020 1640 PO#GREEN AURA.exe 94 PID 4044 set thread context of 3632 4044 fteaum.exe 106 PID 3632 set thread context of 2020 3632 fteaum.exe 94 PID 3632 set thread context of 1172 3632 fteaum.exe 107 PID 1172 set thread context of 2020 1172 netsh.exe 94 PID 1172 set thread context of 5100 1172 netsh.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fteaum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1640 PO#GREEN AURA.exe 1640 PO#GREEN AURA.exe 1640 PO#GREEN AURA.exe 4044 fteaum.exe 4044 fteaum.exe 4044 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 3632 fteaum.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3632 fteaum.exe 2020 PO#GREEN AURA.exe 2020 PO#GREEN AURA.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe 1172 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1640 PO#GREEN AURA.exe Token: SeDebugPrivilege 1640 PO#GREEN AURA.exe Token: SeDebugPrivilege 2020 PO#GREEN AURA.exe Token: SeDebugPrivilege 4044 fteaum.exe Token: SeDebugPrivilege 4044 fteaum.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 1640 wrote to memory of 2020 1640 PO#GREEN AURA.exe 94 PID 2020 wrote to memory of 4044 2020 PO#GREEN AURA.exe 96 PID 2020 wrote to memory of 4044 2020 PO#GREEN AURA.exe 96 PID 2020 wrote to memory of 4044 2020 PO#GREEN AURA.exe 96 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 4044 wrote to memory of 3632 4044 fteaum.exe 106 PID 2020 wrote to memory of 1172 2020 PO#GREEN AURA.exe 107 PID 2020 wrote to memory of 1172 2020 PO#GREEN AURA.exe 107 PID 2020 wrote to memory of 1172 2020 PO#GREEN AURA.exe 107 PID 1172 wrote to memory of 5100 1172 netsh.exe 109 PID 1172 wrote to memory of 5100 1172 netsh.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\fteaum.exe"C:\Users\Admin\AppData\Local\Temp\fteaum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:5100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fteaum.exe"C:\Users\Admin\AppData\Local\Temp\fteaum.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58d47cba5fb89063ee2c14f362b00d92e
SHA10a35fcd1c7bc7dd7ea292c56b541e4f26578c946
SHA256d11a5186c89d02a03124812d1cd6ed17ccd5d93e3d8d8dd911ecc1ef4b516765
SHA51203f178c8ca34c16bbd626697361f3157cd7f81e4fc02fb5fe75cbfea88bc9b1b2988c56008806653bcbeae17a5b8d69551783191554d5426f5f93addd22a1774