Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 13:24
Behavioral task
behavioral1
Sample
SandeLLoVIP.exe
Resource
win7-20241010-en
General
-
Target
SandeLLoVIP.exe
-
Size
69KB
-
MD5
9535d16d8d5a60a4f2547f816e38be83
-
SHA1
1dba310785accfa2299e4d79b8b9b912e6624c01
-
SHA256
a84017166ae53f06b406f68bf77bcc23538db2239f5cd64913c5b36726303d88
-
SHA512
040ce54e43003ad84bdc2ebb36d89b31318f26d0058129be3e11a7cbc5e8757667ae866e0ba0ffa67e45384cc49ef4e5f6da474d75c2afeef22beee4749c984a
-
SSDEEP
1536:aodhbfdfAwXeY+aG1YmpO7PaBcgFElfbokQ5/K6P3nOOgfsaH:1cDNpMyBtifborXOjJ
Malware Config
Extracted
xworm
buying-pro.gl.at.ply.gg:1273
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2716-1-0x0000000000200000-0x0000000000218000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602aac2b9b8edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000961cbcb18262c24db9318d8c3963755a000000000200000000001066000000010000200000009864c50252d4cedd0d53dc04ee30c5267460732df163d1e6ba1916f6dd480306000000000e8000000002000020000000bda20be3fa8dc2e2cf8e0dff499dabcb55ffdf7a7c54465dd3d1ce77c3e8f22a900000006e513872ecdcd3d821fe22f652a0a79013cab0a53a6ace51dc02b2286c8fc3c501ce87e4166257c501150cc96c84944935ab874f202dc95c1e21126f70214f1e0cab0dcf2c13c0980a8eae90a6904e74dfa460706eaea60ebe8d10988196d8ab9bfdbbd06aef2007a4cfc80a19c46d3acc0c7855d2bc0d59830128b3a3ba67df8e8785376d2cc823ae3279b23867804e40000000ef4727108041799ac61afd148194c7a74acf3a399cdf06ef7625d0da3ce8b5783dfc375eb075d09c21f6c14f55947c2555a955c0e9a056f9db0197790fdd3a0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000961cbcb18262c24db9318d8c3963755a00000000020000000000106600000001000020000000ad94dc0a2b22ab9aa018b0208350610442cfde01174a2274b28e309494898a2a000000000e800000000200002000000047a5175d132cbebad385a508f45496028725a9872854f92b8384ff258240e9232000000047ef15a3027e19327dfd55136b58eb83446462ca87583b21363b45e09d7faa75400000008aa70fcd49d686e3554a15688dbe56ab70f2dd38de98ea5890d416a955898c3262df6a7a20a06c08cfb5159f12d7adba1db15a74b7d8390fcb86b859d7322ab8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{572383A1-FA8E-11EF-ACA8-72B5DC1A84E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2716 SandeLLoVIP.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 2560 340 iexplore.exe 33 PID 340 wrote to memory of 2560 340 iexplore.exe 33 PID 340 wrote to memory of 2560 340 iexplore.exe 33 PID 340 wrote to memory of 2560 340 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\SandeLLoVIP.exe"C:\Users\Admin\AppData\Local\Temp\SandeLLoVIP.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\vcredist2010_x64.log.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5406aef4faf3f8410cf2d82e6838b699b
SHA12386b73a1722a98f59c3154968da4ce8fb82e526
SHA25659421d8f22b892aa40c687aade55349669c95ff9df61e0992fa4b825e581371c
SHA5127581522ba014b59eb506dd5ec601123e4c3ee27cbc96d05d8686d3b2aa0386bae3e63f3014f2eaa856df236d200f60c2331398f3b7f802a495ac5403ceb34588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547daea36d1ad341dc7e3aea4491d120a
SHA1dcb804a0896d715975a318a824d389b49b19380e
SHA256f6a74b5372d85f87d5efc11d300cb3c8fbe8b7b8886978a50fe7a10d31d6a33d
SHA512095118fcde9c0024bd98c8fb5ebe3b0ab5a9520be37c606f576d1e982601f8d8c93fd81bca267b9b74b9bed9caa2d7885ffaeec3cf0cb99a4c9943ec6ca2614c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922b87558b6de512a08f3e0db96615bb
SHA1017b159c56f7bfb2171c3e7f2eef58a5c7d24e46
SHA2563a98853f1e405c91de81c807b581f914d57b4ed1f39fb7ca4e4e7deb94ef7350
SHA5125a8d26773c8d41bc49d573a441ab0f4a06209eabdc7c620bb3b7a5b85f6b58515f86faa0b950b4227d58441bd017185b021ee85296f638b6e35209df6a435ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd95bde2dc5f21e3f75db6f85e15cbf0
SHA1fcf57ae30c895bd36c0af9461d3220f0ca72c7ad
SHA25616add628807cee8641566f3032627f8df11939f14860d528e3ea133401863254
SHA512163326e12949d2b640db12fba6e897524b5460f8aff4269711f401f39f80efa904c78213f7926e0d32bb01ec6b4c31d7a00fd80aee641e92a9cb01c452b52e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff68c06e021f708902feadfa8f494ba
SHA108bf2374c4bc8640b38317e0529245a1420c7504
SHA25695c91320393521adc6c94af29531a4b865fc1005d98d6b7ec6b7ea97d49cdc79
SHA512bc8989249f10520a9a7e428685f9a0a0f862abc7aae3618e156f282bced20ac102bdb45d303690d393b2729cf6e1fe7f52bdec784abb69bc9a75f174e5da03a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29fb65aef9e6ae79b46b476923213b9
SHA143d1abfb0c0c252dfe6f43e9ca00a7f2254b62f2
SHA25679cc8278b70f76a2c58b7f8ff4af9c38690d6d24460963bada565211c8b1b18a
SHA512eef53bc2dc6db45b4dadd37a58e2085bdb642a5dd6b4f40f08f1df5e3372cc8cf868887c897fec8595ec0ab5b4ee335ea625111fd02669090142b9e3589ddb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f23f7668781d840afba8190da2a9bd0
SHA1f14b8b37cac4a8b5b13eddf5e0d26e5dee538242
SHA256b8c995f6afbb52ea7c84740aeb1a5de920e3a4d06adaa396110e5ac31c48b9aa
SHA51223b43da3f7f5d2530dfecf3aae9918fec317ffd7f9262e75bd6efef9cd48ccdea5ac73159f55cca1b4caf7d0b7699fadd39773305d1e4c00b08b339c57840f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829b62dd1d1446b0eaae343e140396b5
SHA156261e8e5aedfa1e344e6843f6d2c5a7c409f6ff
SHA2562d561ec3b74315ba0870204780def305b254cba7825cda27e5d523cd12f797f6
SHA5129df9667d0fd1faab92cac52d66e2acb9091e595b5144507b615e9c2ae77a0f810438096d7f9e363daa55db302202dfe6de9337c7d1e46dfd21f37a2dc02c12d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdd5619794085094e66654f443676423
SHA197b3d4d837b3aa25fd0f39c859404452728892f3
SHA25677c93658c5308422302c19da92e61f73483dac211921342c137f7c90bbfe157b
SHA512fdbef29924907fa348a15982b7dae2519d2481be3ca73bc5b759da589efc1779504ab0419b31ddaa44cd3e72cac813fa46aee132d702d72ae165a57c14657c64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc