Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
NEWPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NEWPO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
NEWPO.exe
-
Size
619KB
-
MD5
f04045696fc138e5b37ce3a614b009dd
-
SHA1
90ad0d42c91f1e63cd241269a74c2b2bcb7f785b
-
SHA256
c631b3586ae88b9952c7541fbc6d490f9906b870fc12397a8c7bb84e07eab6cd
-
SHA512
35befc8000afdc23a5d343afc538b5848ae57466f13364c98e1d75a9d9b67852a76c56c203ee3ded606d4e6b81b70ef8a374ea982b309bcc229627ade298fc6e
-
SSDEEP
12288:2iuvt+JET0nPj/w7XUJRRsZsnpuCVEMdwal42220w71k6MIFSwnOXafXTvqoo6qy:iV+JEwnPj/w7astCVep2upWrdTb6y
Malware Config
Extracted
xworm
5.0
135.148.3.78:7001
Nq3DhFaRdPbxvgCQ
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2748-53-0x0000000000470000-0x000000000047E000-memory.dmp family_xworm -
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xworm family
-
Loads dropped DLL 2 IoCs
pid Process 3040 NEWPO.exe 3040 NEWPO.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2748 NEWPO.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3040 NEWPO.exe 2748 NEWPO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEWPO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEWPO.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3040 NEWPO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 NEWPO.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2748 3040 NEWPO.exe 30 PID 3040 wrote to memory of 2748 3040 NEWPO.exe 30 PID 3040 wrote to memory of 2748 3040 NEWPO.exe 30 PID 3040 wrote to memory of 2748 3040 NEWPO.exe 30 PID 3040 wrote to memory of 2748 3040 NEWPO.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEWPO.exe"C:\Users\Admin\AppData\Local\Temp\NEWPO.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\NEWPO.exe"C:\Users\Admin\AppData\Local\Temp\NEWPO.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5be2621a78a13a56cf09e00dd98488360
SHA175f0539dc6af200a07cdb056cddddec595c6cfd2
SHA256852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5
SHA512b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1