Overview
overview
10Static
static
10b8b78dcf13...d2.exe
windows7-x64
10b8b78dcf13...d2.exe
windows10-2004-x64
10b8d253be83...33.exe
windows7-x64
10b8d253be83...33.exe
windows10-2004-x64
7b8ed4395ab...f9.exe
windows7-x64
7b8ed4395ab...f9.exe
windows10-2004-x64
7b93347150f...89.exe
windows7-x64
1b93347150f...89.exe
windows10-2004-x64
1b936c3a846...59.exe
windows7-x64
1b936c3a846...59.exe
windows10-2004-x64
1b985e2e2a0...ef.exe
windows7-x64
3b985e2e2a0...ef.exe
windows10-2004-x64
10b99adb733f...40.exe
windows7-x64
10b99adb733f...40.exe
windows10-2004-x64
10b9cfd0a072...65.exe
windows7-x64
10b9cfd0a072...65.exe
windows10-2004-x64
10b9d4ce4583...bc.exe
windows7-x64
10b9d4ce4583...bc.exe
windows10-2004-x64
10b9eb72c666...72.exe
windows7-x64
10b9eb72c666...72.exe
windows10-2004-x64
10b9f7b13b1d...ef.exe
windows7-x64
10b9f7b13b1d...ef.exe
windows10-2004-x64
10ba0566e43d...23.exe
windows7-x64
1ba0566e43d...23.exe
windows10-2004-x64
1ba21b0abda...c0.exe
windows7-x64
9ba21b0abda...c0.exe
windows10-2004-x64
9ba4d84a77a...85.exe
windows7-x64
10ba4d84a77a...85.exe
windows10-2004-x64
10ba598ceed6...17.exe
windows7-x64
10ba598ceed6...17.exe
windows10-2004-x64
10ba6c7a8dc7...59.exe
windows7-x64
10ba6c7a8dc7...59.exe
windows10-2004-x64
10Analysis
-
max time kernel
156s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
b8b78dcf13364a7f2dc9097d204efbfc8157ca213933396b9c408467e74b1dd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8b78dcf13364a7f2dc9097d204efbfc8157ca213933396b9c408467e74b1dd2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
b8d253be839cc683e7c8c056a7272d33.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
b8d253be839cc683e7c8c056a7272d33.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
b8ed4395ab30b9516f18506071099c95993b70ed8001935c83f64abd866f82f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
b8ed4395ab30b9516f18506071099c95993b70ed8001935c83f64abd866f82f9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
b93347150f9a9e8853d714859da79289.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
b93347150f9a9e8853d714859da79289.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
b936c3a84619de80572b95a1ff1518c9af5821e5ec6e32220ed12169a571f859.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
b936c3a84619de80572b95a1ff1518c9af5821e5ec6e32220ed12169a571f859.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
b985e2e2a066a11c89dd5559cb9cdbef.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
b985e2e2a066a11c89dd5559cb9cdbef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
b99adb733f5130e17033aa18a6ef1363fa8e45b4de8bfb82d16749d0ad825040.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b99adb733f5130e17033aa18a6ef1363fa8e45b4de8bfb82d16749d0ad825040.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
b9cfd0a072e3e0386a247f51c2191a65.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
b9cfd0a072e3e0386a247f51c2191a65.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
b9d4ce458330a463e0bbea9c825699bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b9d4ce458330a463e0bbea9c825699bc.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
b9eb72c6666c879fe3b7532bbf050b72.exe
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
b9eb72c6666c879fe3b7532bbf050b72.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
b9f7b13b1d4a5686a42d38aaefabcaef.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b9f7b13b1d4a5686a42d38aaefabcaef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ba0566e43d769a982fa83229aa91c19d9b96ebeb16abb8be188836e40b79b323.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
ba0566e43d769a982fa83229aa91c19d9b96ebeb16abb8be188836e40b79b323.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ba21b0abda333b699668dfd7b15c9317f61073e34166f91688550a34a2aa9dc0.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ba21b0abda333b699668dfd7b15c9317f61073e34166f91688550a34a2aa9dc0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ba598ceed60e345cfd3e69c2a9a847980011290c2fccfadb294f8872954c9e17.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ba598ceed60e345cfd3e69c2a9a847980011290c2fccfadb294f8872954c9e17.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
ba6c7a8dc76a63c70a2e018c2bd2a059.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ba6c7a8dc76a63c70a2e018c2bd2a059.exe
Resource
win10v2004-20250314-en
General
-
Target
ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe
-
Size
1.6MB
-
MD5
7ea9ab2735abf3ed79269a0b44ddd447
-
SHA1
92e8b7c97db955d908a108764cb570926d2fa2ed
-
SHA256
ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85
-
SHA512
b6bd25318dbab31b4e56ecb35a1a11efff6fcfa3c92a16432f55acf8082fb5f90f0a9a8b1774a11711ffa832fef639edfbf58dbbb4213b356619a2c799433254
-
SSDEEP
49152:94FdetMVCK1LVXXQezP3+Wgm18VeWoAVvqPDe:OdkCCK3XXQO18VeWTVvqPDe
Malware Config
Extracted
xworm
vanechkin-51361.portmap.host:51361
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral27/files/0x000b000000012262-7.dat family_xworm behavioral27/memory/2912-9-0x0000000000250000-0x000000000026C000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 2912 svchost.exe 2804 Extreme Injector v3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 raw.githubusercontent.com 8 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2912 svchost.exe Token: SeDebugPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: SeDebugPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2804 Extreme Injector v3.exe Token: 33 2804 Extreme Injector v3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2912 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 30 PID 2876 wrote to memory of 2912 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 30 PID 2876 wrote to memory of 2912 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 30 PID 2876 wrote to memory of 2804 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 31 PID 2876 wrote to memory of 2804 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 31 PID 2876 wrote to memory of 2804 2876 ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe"C:\Users\Admin\AppData\Local\Temp\ba4d84a77a0cf661df6c88fd41e6d9688f0d2a98ccbdc0555941206969c2df85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.exe"C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ec801a7d4b72a288ec6c207bb9ff0131
SHA132eec2ae1f9e201516fa7fcdc16c4928f7997561
SHA256b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46
SHA512a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac
-
Filesize
85KB
MD52110dce68c8b52f3cfd4e53c5d8434c2
SHA1b6c51e2e4009c0ab5e8990b85a39ca57659a9b66
SHA25617b7b15868c80b8190eb9ddc168c420c90f5da386c166c86e51fdcda96911f6a
SHA512b5dca21533bc1849a70804da37e3787f086513e8d57fe737c265b8ba5b60d8bb85b485b3e46d24f4590686e3d7d2cad32fd77b8f0438be114623987ab9858c2f