Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
PO#GREEN AURA.exe
Resource
win7-20240903-en
General
-
Target
PO#GREEN AURA.exe
-
Size
103KB
-
MD5
71e0c8f71b15046709d4e250086346a4
-
SHA1
9536f9bc5e10128074cdd2597e970b29d44c4bcd
-
SHA256
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
-
SHA512
15cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba
-
SSDEEP
1536:EfDrLD7tmNEoCfjSbHb7RqWYZvZqF3c9MwsUSEJxY87d17:EHLD7Ewub70Wmy3VwQGxY87r7
Malware Config
Extracted
xworm
5.0
QIUpnGyi0OFuIMGO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1800-1348-0x0000000000780000-0x000000000078E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 316 created 3444 316 PO#GREEN AURA.exe 56 PID 2376 created 3444 2376 lazlhn.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation PO#GREEN AURA.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DaylightName.vbs lazlhn.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs PO#GREEN AURA.exe -
Executes dropped EXE 2 IoCs
pid Process 2376 lazlhn.exe 2940 lazlhn.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 316 set thread context of 1800 316 PO#GREEN AURA.exe 94 PID 2376 set thread context of 2940 2376 lazlhn.exe 106 PID 2940 set thread context of 1800 2940 lazlhn.exe 94 PID 2940 set thread context of 2352 2940 lazlhn.exe 107 PID 2352 set thread context of 1800 2352 netsh.exe 94 PID 2352 set thread context of 536 2352 netsh.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lazlhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Key created \Registry\User\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 316 PO#GREEN AURA.exe 316 PO#GREEN AURA.exe 316 PO#GREEN AURA.exe 2376 lazlhn.exe 2376 lazlhn.exe 2376 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2940 lazlhn.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2940 lazlhn.exe 1800 PO#GREEN AURA.exe 1800 PO#GREEN AURA.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 316 PO#GREEN AURA.exe Token: SeDebugPrivilege 316 PO#GREEN AURA.exe Token: SeDebugPrivilege 1800 PO#GREEN AURA.exe Token: SeDebugPrivilege 2376 lazlhn.exe Token: SeDebugPrivilege 2376 lazlhn.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 316 wrote to memory of 1800 316 PO#GREEN AURA.exe 94 PID 1800 wrote to memory of 2376 1800 PO#GREEN AURA.exe 104 PID 1800 wrote to memory of 2376 1800 PO#GREEN AURA.exe 104 PID 1800 wrote to memory of 2376 1800 PO#GREEN AURA.exe 104 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 2376 wrote to memory of 2940 2376 lazlhn.exe 106 PID 1800 wrote to memory of 2352 1800 PO#GREEN AURA.exe 107 PID 1800 wrote to memory of 2352 1800 PO#GREEN AURA.exe 107 PID 1800 wrote to memory of 2352 1800 PO#GREEN AURA.exe 107 PID 2352 wrote to memory of 536 2352 netsh.exe 108 PID 2352 wrote to memory of 536 2352 netsh.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\lazlhn.exe"C:\Users\Admin\AppData\Local\Temp\lazlhn.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lazlhn.exe"C:\Users\Admin\AppData\Local\Temp\lazlhn.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58d47cba5fb89063ee2c14f362b00d92e
SHA10a35fcd1c7bc7dd7ea292c56b541e4f26578c946
SHA256d11a5186c89d02a03124812d1cd6ed17ccd5d93e3d8d8dd911ecc1ef4b516765
SHA51203f178c8ca34c16bbd626697361f3157cd7f81e4fc02fb5fe75cbfea88bc9b1b2988c56008806653bcbeae17a5b8d69551783191554d5426f5f93addd22a1774