Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
update.exe
Resource
win7-20241010-en
General
-
Target
update.exe
-
Size
221KB
-
MD5
c2bc3732467892cdf222c9161773405a
-
SHA1
43770742e6a28930a1cc4e415e7e03df870c9e92
-
SHA256
b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca
-
SHA512
6c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1
-
SSDEEP
3072:Gj+C7lQ52Mrb/xqHuXxcKXnlzlbm9EHBAnpK37nXZ8j0uIQ7bnPs074tyJhXgK0J:o77MrQO58VxnPJqta
Malware Config
Extracted
xworm
3.0
147.185.221.26:27759
39bfHGiD4o1FzWnH
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2704-23-0x0000000000170000-0x000000000017E000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2060 powershell.exe 2776 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 RtkAudUService64.exe 2036 RtkAudUService64.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\RtkAudUService64.exe update.exe File created C:\Windows\RtkAudUService64.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2060 powershell.exe 2776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2620 update.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2704 RtkAudUService64.exe Token: SeDebugPrivilege 2704 RtkAudUService64.exe Token: SeDebugPrivilege 2036 RtkAudUService64.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2060 2620 update.exe 30 PID 2620 wrote to memory of 2060 2620 update.exe 30 PID 2620 wrote to memory of 2060 2620 update.exe 30 PID 2620 wrote to memory of 2776 2620 update.exe 32 PID 2620 wrote to memory of 2776 2620 update.exe 32 PID 2620 wrote to memory of 2776 2620 update.exe 32 PID 2716 wrote to memory of 2704 2716 taskeng.exe 36 PID 2716 wrote to memory of 2704 2716 taskeng.exe 36 PID 2716 wrote to memory of 2704 2716 taskeng.exe 36 PID 2704 wrote to memory of 308 2704 RtkAudUService64.exe 37 PID 2704 wrote to memory of 308 2704 RtkAudUService64.exe 37 PID 2704 wrote to memory of 308 2704 RtkAudUService64.exe 37 PID 2716 wrote to memory of 2036 2716 taskeng.exe 40 PID 2716 wrote to memory of 2036 2716 taskeng.exe 40 PID 2716 wrote to memory of 2036 2716 taskeng.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\RtkAudUService64.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {97195EFA-8A5C-45EC-BD0A-7EACD9AC48D1} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\RtkAudUService64.exeC:\Windows\RtkAudUService64.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RtkAudUService64" /tr "C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:308
-
-
-
C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exeC:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bdd26cea462a15d44abfd52c6d833689
SHA13262033ffd9fab1cd5134b05bfdec12478e81424
SHA256927ea7b7a13baa0b9db0e9a28d55554b9320eeb5eae9ab68729b95d3b804b158
SHA512c3cadc5a4d1ed16e8ff2da507f47f828daba7ec54cb6aa4204ef80d93be6694262f452c72dccaa421a5f93476cc1250fd01db1126ae712bfb293c1d61af4970b
-
Filesize
221KB
MD5c2bc3732467892cdf222c9161773405a
SHA143770742e6a28930a1cc4e415e7e03df870c9e92
SHA256b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca
SHA5126c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1