Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 02:26
Behavioral task
behavioral1
Sample
RedWare Temp V3.exe
Resource
win7-20240903-en
General
-
Target
RedWare Temp V3.exe
-
Size
86KB
-
MD5
dd14ce42c869309959374b8497b8b8c6
-
SHA1
3d6fbe7bdccb4d779e84ac058f8c7ec8fc3e623f
-
SHA256
78286063f2e7de6b9d38075affdbfd0f24456eceefb4e86321298e71409a6a02
-
SHA512
95975b34eac64834cffeba1322d3718afead0163cf11fb4362c12cb1d34beabc38cc4407619de98726cd977a212fed7002a2664b37ce105d07e8265776f47124
-
SSDEEP
1536:gp+KuU1oVHPsbMJuguun/Gmf6WpFOfNAL78C4Mnh:g4TQotPsbsugR/GOzOfq/t1h
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/KESYt2Qf
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/1744-1-0x0000000000330000-0x000000000034C000-memory.dmp family_xworm behavioral1/files/0x0006000000004ed7-35.dat family_xworm behavioral1/memory/1908-37-0x00000000001D0000-0x00000000001EC000-memory.dmp family_xworm behavioral1/memory/1280-40-0x0000000000130000-0x000000000014C000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1372 powershell.exe 2716 powershell.exe 2356 powershell.exe 2732 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk RedWare Temp V3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk RedWare Temp V3.exe -
Executes dropped EXE 2 IoCs
pid Process 1908 XClient.exe 1280 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" RedWare Temp V3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 28 IoCs
flow ioc 15 pastebin.com 28 pastebin.com 29 pastebin.com 31 pastebin.com 22 pastebin.com 25 pastebin.com 26 pastebin.com 27 pastebin.com 30 pastebin.com 32 pastebin.com 34 pastebin.com 36 pastebin.com 7 pastebin.com 8 pastebin.com 10 pastebin.com 16 pastebin.com 33 pastebin.com 37 pastebin.com 11 pastebin.com 13 pastebin.com 17 pastebin.com 18 pastebin.com 24 pastebin.com 35 pastebin.com 23 pastebin.com 9 pastebin.com 12 pastebin.com 14 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 powershell.exe 2356 powershell.exe 2732 powershell.exe 1372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1744 RedWare Temp V3.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1908 XClient.exe Token: SeDebugPrivilege 1280 XClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2716 1744 RedWare Temp V3.exe 32 PID 1744 wrote to memory of 2716 1744 RedWare Temp V3.exe 32 PID 1744 wrote to memory of 2716 1744 RedWare Temp V3.exe 32 PID 1744 wrote to memory of 2356 1744 RedWare Temp V3.exe 34 PID 1744 wrote to memory of 2356 1744 RedWare Temp V3.exe 34 PID 1744 wrote to memory of 2356 1744 RedWare Temp V3.exe 34 PID 1744 wrote to memory of 2732 1744 RedWare Temp V3.exe 36 PID 1744 wrote to memory of 2732 1744 RedWare Temp V3.exe 36 PID 1744 wrote to memory of 2732 1744 RedWare Temp V3.exe 36 PID 1744 wrote to memory of 1372 1744 RedWare Temp V3.exe 38 PID 1744 wrote to memory of 1372 1744 RedWare Temp V3.exe 38 PID 1744 wrote to memory of 1372 1744 RedWare Temp V3.exe 38 PID 1744 wrote to memory of 488 1744 RedWare Temp V3.exe 40 PID 1744 wrote to memory of 488 1744 RedWare Temp V3.exe 40 PID 1744 wrote to memory of 488 1744 RedWare Temp V3.exe 40 PID 2168 wrote to memory of 1908 2168 taskeng.exe 43 PID 2168 wrote to memory of 1908 2168 taskeng.exe 43 PID 2168 wrote to memory of 1908 2168 taskeng.exe 43 PID 2168 wrote to memory of 1280 2168 taskeng.exe 44 PID 2168 wrote to memory of 1280 2168 taskeng.exe 44 PID 2168 wrote to memory of 1280 2168 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RedWare Temp V3.exe"C:\Users\Admin\AppData\Local\Temp\RedWare Temp V3.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RedWare Temp V3.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RedWare Temp V3.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:488
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0299A111-025C-49EC-AE43-54D21EB94611} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD542d15f7345ded4a0e1a643cdb89abc0f
SHA15be3b6380e7827214b1c802143e5b3b7a7a40b23
SHA2560e38a0e088afba7b0031bc7e8e4da01c188447efab2db9a3cf6e3964e1c2297f
SHA5124805d6767c97e501f9c888bf70d0ba4d77efa8f81f9c5b7051c6123a99b9923a6544f34bbc6b7e67d6ab119dd97b1d62ed5963ca3bedb1de1371275fb0fe66ad
-
Filesize
86KB
MD5dd14ce42c869309959374b8497b8b8c6
SHA13d6fbe7bdccb4d779e84ac058f8c7ec8fc3e623f
SHA25678286063f2e7de6b9d38075affdbfd0f24456eceefb4e86321298e71409a6a02
SHA51295975b34eac64834cffeba1322d3718afead0163cf11fb4362c12cb1d34beabc38cc4407619de98726cd977a212fed7002a2664b37ce105d07e8265776f47124