Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
PO#GREEN AURA.exe
Resource
win7-20240903-en
General
-
Target
PO#GREEN AURA.exe
-
Size
103KB
-
MD5
71e0c8f71b15046709d4e250086346a4
-
SHA1
9536f9bc5e10128074cdd2597e970b29d44c4bcd
-
SHA256
462e4f6c2647a8fffb7be6a37eca3dfef4051f9f20a5e8927b446d98d1af84f0
-
SHA512
15cd09125122f6e79bffc9112ee888c4afef515d09a9598da2b23cbc240b043e63f1d3d6538c74fc56cd65eeeb756679f1a4d54dd74e0a026ba80a7999dff2ba
-
SSDEEP
1536:EfDrLD7tmNEoCfjSbHb7RqWYZvZqF3c9MwsUSEJxY87d17:EHLD7Ewub70Wmy3VwQGxY87r7
Malware Config
Extracted
xworm
5.0
QIUpnGyi0OFuIMGO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2060-1349-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1220 created 3440 1220 PO#GREEN AURA.exe 56 PID 4988 created 3440 4988 vixqbf.exe 56 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation PO#GREEN AURA.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Count.vbs PO#GREEN AURA.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DaylightName.vbs vixqbf.exe -
Executes dropped EXE 2 IoCs
pid Process 4988 vixqbf.exe 1548 vixqbf.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1220 set thread context of 2060 1220 PO#GREEN AURA.exe 99 PID 4988 set thread context of 1548 4988 vixqbf.exe 113 PID 1548 set thread context of 2060 1548 vixqbf.exe 99 PID 1548 set thread context of 3156 1548 vixqbf.exe 114 PID 3156 set thread context of 2060 3156 netsh.exe 99 PID 3156 set thread context of 4628 3156 netsh.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#GREEN AURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vixqbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1220 PO#GREEN AURA.exe 1220 PO#GREEN AURA.exe 1220 PO#GREEN AURA.exe 4988 vixqbf.exe 4988 vixqbf.exe 4988 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 1548 vixqbf.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1548 vixqbf.exe 2060 PO#GREEN AURA.exe 2060 PO#GREEN AURA.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe 3156 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1220 PO#GREEN AURA.exe Token: SeDebugPrivilege 1220 PO#GREEN AURA.exe Token: SeDebugPrivilege 2060 PO#GREEN AURA.exe Token: SeDebugPrivilege 4988 vixqbf.exe Token: SeDebugPrivilege 4988 vixqbf.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 1220 wrote to memory of 2060 1220 PO#GREEN AURA.exe 99 PID 2060 wrote to memory of 4988 2060 PO#GREEN AURA.exe 111 PID 2060 wrote to memory of 4988 2060 PO#GREEN AURA.exe 111 PID 2060 wrote to memory of 4988 2060 PO#GREEN AURA.exe 111 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 4988 wrote to memory of 1548 4988 vixqbf.exe 113 PID 2060 wrote to memory of 3156 2060 PO#GREEN AURA.exe 114 PID 2060 wrote to memory of 3156 2060 PO#GREEN AURA.exe 114 PID 2060 wrote to memory of 3156 2060 PO#GREEN AURA.exe 114 PID 3156 wrote to memory of 4628 3156 netsh.exe 115 PID 3156 wrote to memory of 4628 3156 netsh.exe 115
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"C:\Users\Admin\AppData\Local\Temp\PO#GREEN AURA.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\vixqbf.exe"C:\Users\Admin\AppData\Local\Temp\vixqbf.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:4628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vixqbf.exe"C:\Users\Admin\AppData\Local\Temp\vixqbf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58d47cba5fb89063ee2c14f362b00d92e
SHA10a35fcd1c7bc7dd7ea292c56b541e4f26578c946
SHA256d11a5186c89d02a03124812d1cd6ed17ccd5d93e3d8d8dd911ecc1ef4b516765
SHA51203f178c8ca34c16bbd626697361f3157cd7f81e4fc02fb5fe75cbfea88bc9b1b2988c56008806653bcbeae17a5b8d69551783191554d5426f5f93addd22a1774