Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 12:38
General
-
Target
AyuGram.exe
-
Size
41KB
-
MD5
78e28fd861f6639f530b75078074e29a
-
SHA1
c02da865dc5af2d7d70909f536595cb905b4c0af
-
SHA256
92b5d7c61acf1cb06fc46a23f928551ef1456fefb543bb7d6b928b986fea4251
-
SHA512
276e3a174b0c2aaa7557765f22fd1fd4ace70aa29cbffa79121584ec5c7747921ae500095463ae1975824a504c01543e73bf53182a8cdefa7261080b2efec0d1
-
SSDEEP
768:k8hOzqVhNY8HgbAvrSH7tF5Pa9quuOOwh03/mXO:kerTHCAv6xF49qPOOwi+XO
Malware Config
Extracted
Family
xworm
Version
5.0
C2
needed-below.gl.at.ply.gg:8496
restaurant-volunteer.gl.at.ply.gg:8496
127.0.0.1:8496
147.185.221.26:8496
contains-player.gl.at.ply.gg:8496
Mutex
SxCIX01GGSj4AMkg
Attributes
-
Install_directory
%AppData%
-
install_file
rustneats.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1884-1-0x0000000000810000-0x0000000000820000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 ip-api.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1884 AyuGram.exe Token: SeDebugPrivilege 3308 taskmgr.exe Token: SeSystemProfilePrivilege 3308 taskmgr.exe Token: SeCreateGlobalPrivilege 3308 taskmgr.exe Token: 33 3308 taskmgr.exe Token: SeIncBasePriorityPrivilege 3308 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe 3308 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AyuGram.exe"C:\Users\Admin\AppData\Local\Temp\AyuGram.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3308