Analysis
-
max time kernel
54s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-06-2024 20:26
Behavioral task
behavioral1
Sample
gjruheigerg.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
gjruheigerg.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
gjruheigerg.exe
Resource
win10v2004-20240226-en
General
-
Target
gjruheigerg.exe
-
Size
84KB
-
MD5
b5fbb4aec5eaf3f64a592e72ac30a1ab
-
SHA1
993b36feeb223032ec7a536687cfe37ddf2ffd39
-
SHA256
ca608f15c34d7526591d75a76d1a29ef03e17c133ef2dfb7dda09be631d0e449
-
SHA512
8768a68783e11654da0815b574e7e20c3cdaa4b4f710b6d288f9a69082f040177d32b2fdaf34b42239308ea21d4e3fc4319b67145b0f2b8126a4fc7a007dcc53
-
SSDEEP
1536:Xb5H+OMwTEBrZ5idVjzXGbhpTw6DG6GiyoAOsjJKVV4yAETSAJ0iH:rgG0FkbH2bhpM6NAOsViyylyY
Malware Config
Extracted
xworm
79.202.250.5:80
-
Install_directory
%Temp%
-
install_file
discord_autoupdaterconfifm.exe
-
telegram
https://api.telegram.org/bot7345950584:AAH5ca8n_1S4bD12cZuSsr23SjFGXJYzRk0
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2024-0-0x0000000000480000-0x000000000049C000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exe family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 4648 powershell.exe 2716 powershell.exe 1744 powershell.exe 5092 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
discord_autoupdaterconfifm.exepid process 3340 discord_autoupdaterconfifm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4416 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exegjruheigerg.exepid process 2716 powershell.exe 2716 powershell.exe 2716 powershell.exe 1744 powershell.exe 1744 powershell.exe 1744 powershell.exe 5092 powershell.exe 5092 powershell.exe 5092 powershell.exe 4648 powershell.exe 4648 powershell.exe 4648 powershell.exe 2024 gjruheigerg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
gjruheigerg.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2024 gjruheigerg.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeIncreaseQuotaPrivilege 2716 powershell.exe Token: SeSecurityPrivilege 2716 powershell.exe Token: SeTakeOwnershipPrivilege 2716 powershell.exe Token: SeLoadDriverPrivilege 2716 powershell.exe Token: SeSystemProfilePrivilege 2716 powershell.exe Token: SeSystemtimePrivilege 2716 powershell.exe Token: SeProfSingleProcessPrivilege 2716 powershell.exe Token: SeIncBasePriorityPrivilege 2716 powershell.exe Token: SeCreatePagefilePrivilege 2716 powershell.exe Token: SeBackupPrivilege 2716 powershell.exe Token: SeRestorePrivilege 2716 powershell.exe Token: SeShutdownPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeSystemEnvironmentPrivilege 2716 powershell.exe Token: SeRemoteShutdownPrivilege 2716 powershell.exe Token: SeUndockPrivilege 2716 powershell.exe Token: SeManageVolumePrivilege 2716 powershell.exe Token: 33 2716 powershell.exe Token: 34 2716 powershell.exe Token: 35 2716 powershell.exe Token: 36 2716 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeIncreaseQuotaPrivilege 1744 powershell.exe Token: SeSecurityPrivilege 1744 powershell.exe Token: SeTakeOwnershipPrivilege 1744 powershell.exe Token: SeLoadDriverPrivilege 1744 powershell.exe Token: SeSystemProfilePrivilege 1744 powershell.exe Token: SeSystemtimePrivilege 1744 powershell.exe Token: SeProfSingleProcessPrivilege 1744 powershell.exe Token: SeIncBasePriorityPrivilege 1744 powershell.exe Token: SeCreatePagefilePrivilege 1744 powershell.exe Token: SeBackupPrivilege 1744 powershell.exe Token: SeRestorePrivilege 1744 powershell.exe Token: SeShutdownPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeSystemEnvironmentPrivilege 1744 powershell.exe Token: SeRemoteShutdownPrivilege 1744 powershell.exe Token: SeUndockPrivilege 1744 powershell.exe Token: SeManageVolumePrivilege 1744 powershell.exe Token: 33 1744 powershell.exe Token: 34 1744 powershell.exe Token: 35 1744 powershell.exe Token: 36 1744 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeIncreaseQuotaPrivilege 5092 powershell.exe Token: SeSecurityPrivilege 5092 powershell.exe Token: SeTakeOwnershipPrivilege 5092 powershell.exe Token: SeLoadDriverPrivilege 5092 powershell.exe Token: SeSystemProfilePrivilege 5092 powershell.exe Token: SeSystemtimePrivilege 5092 powershell.exe Token: SeProfSingleProcessPrivilege 5092 powershell.exe Token: SeIncBasePriorityPrivilege 5092 powershell.exe Token: SeCreatePagefilePrivilege 5092 powershell.exe Token: SeBackupPrivilege 5092 powershell.exe Token: SeRestorePrivilege 5092 powershell.exe Token: SeShutdownPrivilege 5092 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeSystemEnvironmentPrivilege 5092 powershell.exe Token: SeRemoteShutdownPrivilege 5092 powershell.exe Token: SeUndockPrivilege 5092 powershell.exe Token: SeManageVolumePrivilege 5092 powershell.exe Token: 33 5092 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
gjruheigerg.exepid process 2024 gjruheigerg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
gjruheigerg.execmd.exedescription pid process target process PID 2024 wrote to memory of 2716 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 2716 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 1744 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 1744 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 5092 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 5092 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 4648 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 4648 2024 gjruheigerg.exe powershell.exe PID 2024 wrote to memory of 4496 2024 gjruheigerg.exe schtasks.exe PID 2024 wrote to memory of 4496 2024 gjruheigerg.exe schtasks.exe PID 2024 wrote to memory of 4716 2024 gjruheigerg.exe schtasks.exe PID 2024 wrote to memory of 4716 2024 gjruheigerg.exe schtasks.exe PID 2024 wrote to memory of 1176 2024 gjruheigerg.exe cmd.exe PID 2024 wrote to memory of 1176 2024 gjruheigerg.exe cmd.exe PID 1176 wrote to memory of 4416 1176 cmd.exe timeout.exe PID 1176 wrote to memory of 4416 1176 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\gjruheigerg.exe"C:\Users\Admin\AppData\Local\Temp\gjruheigerg.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\gjruheigerg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'gjruheigerg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'discord_autoupdaterconfifm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "discord_autoupdaterconfifm" /tr "C:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exe"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "discord_autoupdaterconfifm"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2FE5.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exeC:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56e95a4c17420177ac092e69f02ef9631
SHA1cc2f58ea7e0a776997821c11c481f378f7127a0c
SHA25676195db50d5b712922cb375386be8f919fd80dead8f531dec46d4f942cc58342
SHA512308d844a1733a4227972a399dade8642e66dfe10683644dec85e29d79d1f7cfc824ef2d11844044821a2ea22f80d65aa991014eff2f4af2d2f0540409ee5a560
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD51904b939ca1fe44637040594ad29bcdf
SHA16502e3c04ed6d4b607be841b1b16d9fdb829ae63
SHA256338382183bba1888b4e71858cd3663ce194f8f15d64b96cbb2aaa35756016eca
SHA51295273c03b4fb5c74986c93f60a2a6e166315dcd797df5de6db5828fd6a6212f649df6a2eeebbab7e0fdb955b2fe010c7e21b5ce6b600c6fb7db0bdda78f61cbb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5794b3d4abb90736ecb991f569ae37b7d
SHA1e5563634931b869a7ca2fe7f08c05bd82823aa84
SHA256f7a99bc76b3d9ef1e049f65455813ee28c10e643b66c3f6eb45574479afeabc5
SHA512511fb40c12c3335221998d4f1fde036b12f3f3d4486024947dde3d773cafc0f56eda4b9dcacc7fc51bc4d4bf02bb61e616505adc54269ceeb593180a4d494214
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_he5u0ovk.tox.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\discord_autoupdaterconfifm.exeFilesize
84KB
MD5b5fbb4aec5eaf3f64a592e72ac30a1ab
SHA1993b36feeb223032ec7a536687cfe37ddf2ffd39
SHA256ca608f15c34d7526591d75a76d1a29ef03e17c133ef2dfb7dda09be631d0e449
SHA5128768a68783e11654da0815b574e7e20c3cdaa4b4f710b6d288f9a69082f040177d32b2fdaf34b42239308ea21d4e3fc4319b67145b0f2b8126a4fc7a007dcc53
-
C:\Users\Admin\AppData\Local\Temp\tmp2FE5.tmp.batFilesize
163B
MD5d0de51bc48399edcd23fb59cda27226c
SHA1e0acf6570a45880857aad288e731514b3eb00d1b
SHA256168c7f5da48c8743f7e57a7d732ab80c458010496281067c908fb4dc5de713c1
SHA51238a7751b79b47410f6aef11983bae7ea20dee54e3e0feeb245f93e8b790ba45ce83d5d0df61aa6449d18d24f679ee2d2e53d986da9c1e0953a8496831286ae01
-
memory/2024-183-0x00007FFBF4EC3000-0x00007FFBF4EC4000-memory.dmpFilesize
4KB
-
memory/2024-0-0x0000000000480000-0x000000000049C000-memory.dmpFilesize
112KB
-
memory/2024-2-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2024-1-0x00007FFBF4EC3000-0x00007FFBF4EC4000-memory.dmpFilesize
4KB
-
memory/2024-184-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2024-192-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2716-51-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2716-7-0x000001E8CCA50000-0x000001E8CCA72000-memory.dmpFilesize
136KB
-
memory/2716-8-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2716-11-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2716-12-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmpFilesize
9.9MB
-
memory/2716-13-0x000001E8CCC00000-0x000001E8CCC76000-memory.dmpFilesize
472KB