Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
PO#GREEN AURA.exe
Resource
win7-20240903-en
General
-
Target
PO#GREEN AURA.exe
-
Size
103KB
-
MD5
71e0c8f71b15046709d4e250086346a4
-
SHA1
9536f9bc5e10128074cdd2597e970b29d44c4bcd
-
SHA256
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
-
SHA512
15cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba
-
SSDEEP
1536:EfDrLD7tmNEoCfjSbHb7RqWYZvZqF3c9MwsUSEJxY87d17:EHLD7Ewub70Wmy3VwQGxY87r7
Malware Config
Extracted
xworm
5.0
QIUpnGyi0OFuIMGO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1392-1349-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1248 created 3288 1248 PO#GREEN AURA.exe 55 PID 4052 created 3288 4052 jxeuas.exe 55 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation PO#GREEN AURA.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs PO#GREEN AURA.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DaylightName.vbs jxeuas.exe -
Executes dropped EXE 2 IoCs
pid Process 4052 jxeuas.exe 2472 jxeuas.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1248 set thread context of 1392 1248 PO#GREEN AURA.exe 97 PID 4052 set thread context of 2472 4052 jxeuas.exe 109 PID 2472 set thread context of 1392 2472 jxeuas.exe 97 PID 2472 set thread context of 3900 2472 jxeuas.exe 110 PID 3900 set thread context of 1392 3900 netsh.exe 97 PID 3900 set thread context of 212 3900 netsh.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxeuas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1248 PO#GREEN AURA.exe 1248 PO#GREEN AURA.exe 1248 PO#GREEN AURA.exe 4052 jxeuas.exe 4052 jxeuas.exe 4052 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 2472 jxeuas.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2472 jxeuas.exe 1392 PO#GREEN AURA.exe 1392 PO#GREEN AURA.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe 3900 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1248 PO#GREEN AURA.exe Token: SeDebugPrivilege 1248 PO#GREEN AURA.exe Token: SeDebugPrivilege 1392 PO#GREEN AURA.exe Token: SeDebugPrivilege 4052 jxeuas.exe Token: SeDebugPrivilege 4052 jxeuas.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1248 wrote to memory of 1392 1248 PO#GREEN AURA.exe 97 PID 1392 wrote to memory of 4052 1392 PO#GREEN AURA.exe 107 PID 1392 wrote to memory of 4052 1392 PO#GREEN AURA.exe 107 PID 1392 wrote to memory of 4052 1392 PO#GREEN AURA.exe 107 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 4052 wrote to memory of 2472 4052 jxeuas.exe 109 PID 1392 wrote to memory of 3900 1392 PO#GREEN AURA.exe 110 PID 1392 wrote to memory of 3900 1392 PO#GREEN AURA.exe 110 PID 1392 wrote to memory of 3900 1392 PO#GREEN AURA.exe 110 PID 3900 wrote to memory of 212 3900 netsh.exe 111 PID 3900 wrote to memory of 212 3900 netsh.exe 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\jxeuas.exe"C:\Users\Admin\AppData\Local\Temp\jxeuas.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jxeuas.exe"C:\Users\Admin\AppData\Local\Temp\jxeuas.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58d47cba5fb89063ee2c14f362b00d92e
SHA10a35fcd1c7bc7dd7ea292c56b541e4f26578c946
SHA256d11a5186c89d02a03124812d1cd6ed17ccd5d93e3d8d8dd911ecc1ef4b516765
SHA51203f178c8ca34c16bbd626697361f3157cd7f81e4fc02fb5fe75cbfea88bc9b1b2988c56008806653bcbeae17a5b8d69551783191554d5426f5f93addd22a1774