Edit tour
Windows
Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe
Overview
General Information
Detection
PureLog Stealer, XWorm
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected BrowserPasswordDump
Yara detected PureLog Stealer
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe (PID: 6508 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.W in32.Crypt erX-gen.12 642.14495. exe MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 6708 cmdline:
"C:\Window s\System32 \cmd.exe" /c powersh ell set-mp preference -exclusio npath C:\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6880 cmdline:
powershell set-mppre ference -e xclusionpa th C:\ MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - Botmaster 5.8 direct.exe (PID: 5684 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Botmas ter 5.8 di rect.exe" MD5: C9C01FDC7D3AD84CEEB43C6B099A8AD5) - BotMaster.exe (PID: 3736 cmdline:
C:\Program Files (x8 6)\Bot Mas ter\Bot Ma ster\BotMa ster.exe MD5: 895F3A548FD8FA6FD1355AF6D218DA2C) - msedgewebview2.exe (PID: 6924 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --embedd ed-browser -webview=1 --webview -exe-name= BotMaster. exe --webv iew-exe-ve rsion=5.8. 0.1 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- noerrdialo gs --embed ded-browse r-webview- dpi-awaren ess=0 --en able-featu res=MojoIp cz --mojo- named-plat form-chann el-pipe=37 36.6896.86 5895741088 582256 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 6072 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=c rashpad-ha ndler --us er-data-di r=C:\Users \user\AppD ata\Roamin g\BotMaste r\DefaultP rofiles\EB WebView /p refetch:7 --monitor- self-annot ation=ptyp e=crashpad -handler - -database= C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView\Cras hpad --ann otation=Is OfficialBu ild=1 --an notation=c hannel= -- annotation =chromium- version=11 7.0.5938.1 32 "--anno tation=exe =C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --annota tion=plat= Win64 "--a nnotation= prod=Edge WebView2" --annotati on=ver=117 .0.2045.47 --initial -client-da ta=0x160,0 x164,0x168 ,0x15c,0x1 70,0x7ffdf b318e88,0x 7ffdfb318e 98,0x7ffdf b318ea8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 3588 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=g pu-process --noerrdi alogs --us er-data-di r="C:\User s\user\App Data\Roami ng\BotMast er\Default Profiles\E BWebView" --webview- exe-name=B otMaster.e xe --webvi ew-exe-ver sion=5.8.0 .1 --embed ded-browse r-webview= 1 --embedd ed-browser -webview-d pi-awarene ss=0 --gpu -preferenc es=WAAAAAA AAADgAAAMA AAAAAAAAAA AAAAAAABgA AAAAAA4AAA AAAAAAAAAA AAEAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAG AAAAAAAAAA YAAAAAAAAA AgAAAAAAAA ACAAAAAAAA AAIAAAAAAA AAA== --mo jo-platfor m-channel- handle=176 0 --field- trial-hand le=1788,i, 1635519549 2384305926 ,163749206 0374259572 3,262144 - -enable-fe atures=Moj oIpcz /pre fetch:2 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 3344 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-GB -- service-sa ndbox-type =none --no errdialogs --user-da ta-dir="C: \Users\use r\AppData\ Roaming\Bo tMaster\De faultProfi les\EBWebV iew" --web view-exe-n ame=BotMas ter.exe -- webview-ex e-version= 5.8.0.1 -- embedded-b rowser-web view=1 --e mbedded-br owser-webv iew-dpi-aw areness=0 --mojo-pla tform-chan nel-handle =2212 --fi eld-trial- handle=178 8,i,163551 9549238430 5926,16374 9206037425 95723,2621 44 --enabl e-features =MojoIpcz /prefetch: 3 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 2112 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=stor age.mojom. StorageSer vice --lan g=en-GB -- service-sa ndbox-type =service - -noerrdial ogs --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- webview-ex e-name=Bot Master.exe --webview -exe-versi on=5.8.0.1 --embedde d-browser- webview=1 --embedded -browser-w ebview-dpi -awareness =0 --mojo- platform-c hannel-han dle=2452 - -field-tri al-handle= 1788,i,163 5519549238 4305926,16 3749206037 42595723,2 62144 --en able-featu res=MojoIp cz /prefet ch:8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 1404 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --f irst-rende rer-proces s --lang=e n-GB --dev ice-scale- factor=1 - -num-raste r-threads= 2 --enable -main-fram e-before-a ctivation --renderer -client-id =5 --js-fl ags="--har mony-weak- refs-with- cleanup-so me --expos e-gc --ms- user-local e=en_CH" - -time-tick s-at-unix- epoch=-171 0081883373 791 --laun ch-time-ti cks=638123 9210 --moj o-platform -channel-h andle=3372 --field-t rial-handl e=1788,i,1 6355195492 384305926, 1637492060 3742595723 ,262144 -- enable-fea tures=Mojo Ipcz /pref etch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 4628 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --embedd ed-browser -webview=1 --webview -exe-name= BotMaster. exe --webv iew-exe-ve rsion=5.8. 0.1 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- noerrdialo gs --embed ded-browse r-webview- dpi-awaren ess=0 --en able-featu res=MojoIp cz --mojo- named-plat form-chann el-pipe=37 36.6896.16 9632025306 93688502 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 2816 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=c rashpad-ha ndler --us er-data-di r=C:\Users \user\AppD ata\Roamin g\BotMaste r\DefaultP rofiles\EB WebView /p refetch:7 --monitor- self-annot ation=ptyp e=crashpad -handler - -database= C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView\Cras hpad --ann otation=Is OfficialBu ild=1 --an notation=c hannel= -- annotation =chromium- version=11 7.0.5938.1 32 "--anno tation=exe =C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --annota tion=plat= Win64 "--a nnotation= prod=Edge WebView2" --annotati on=ver=117 .0.2045.47 --initial -client-da ta=0x164,0 x168,0x16c ,0x13c,0x1 a4,0x7ffdf b318e88,0x 7ffdfb318e 98,0x7ffdf b318ea8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 6828 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=g pu-process --noerrdi alogs --us er-data-di r="C:\User s\user\App Data\Roami ng\BotMast er\Default Profiles\E BWebView" --webview- exe-name=B otMaster.e xe --webvi ew-exe-ver sion=5.8.0 .1 --embed ded-browse r-webview= 1 --embedd ed-browser -webview-d pi-awarene ss=0 --gpu -preferenc es=WAAAAAA AAADgAAAMA AAAAAAAAAA AAAAAAABgA AAAAAA4AAA AAAAAAAAAA AAEAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAG AAAAAAAAAA YAAAAAAAAA AgAAAAAAAA ACAAAAAAAA AAIAAAAAAA AAA== --mo jo-platfor m-channel- handle=178 0 --field- trial-hand le=1228,i, 1260058409 9610770697 ,135004715 8215668037 5,262144 - -enable-fe atures=Moj oIpcz /pre fetch:2 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 5724 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-GB -- service-sa ndbox-type =none --no errdialogs --user-da ta-dir="C: \Users\use r\AppData\ Roaming\Bo tMaster\De faultProfi les\EBWebV iew" --web view-exe-n ame=BotMas ter.exe -- webview-ex e-version= 5.8.0.1 -- embedded-b rowser-web view=1 --e mbedded-br owser-webv iew-dpi-aw areness=0 --mojo-pla tform-chan nel-handle =2376 --fi eld-trial- handle=122 8,i,126005 8409961077 0697,13500 4715821566 80375,2621 44 --enabl e-features =MojoIpcz /prefetch: 3 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 7036 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=stor age.mojom. StorageSer vice --lan g=en-GB -- service-sa ndbox-type =service - -noerrdial ogs --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- webview-ex e-name=Bot Master.exe --webview -exe-versi on=5.8.0.1 --embedde d-browser- webview=1 --embedded -browser-w ebview-dpi -awareness =0 --mojo- platform-c hannel-han dle=2628 - -field-tri al-handle= 1228,i,126 0058409961 0770697,13 5004715821 56680375,2 62144 --en able-featu res=MojoIp cz /prefet ch:8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 1308 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --f irst-rende rer-proces s --lang=e n-GB --dev ice-scale- factor=1 - -num-raste r-threads= 2 --enable -main-fram e-before-a ctivation --renderer -client-id =5 --js-fl ags="--har mony-weak- refs-with- cleanup-so me --expos e-gc --ms- user-local e=en_CH" - -time-tick s-at-unix- epoch=-171 0081883367 231 --laun ch-time-ti cks=639527 3895 --moj o-platform -channel-h andle=3444 --field-t rial-handl e=1228,i,1 2600584099 610770697, 1350047158 2156680375 ,262144 -- enable-fea tures=Mojo Ipcz /pref etch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 6032 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --l ang=en-GB --device-s cale-facto r=1 --num- raster-thr eads=2 --e nable-main -frame-bef ore-activa tion --ren derer-clie nt-id=6 -- js-flags=" --harmony- weak-refs- with-clean up-some -- expose-gc --ms-user- locale=en_ CH" --time -ticks-at- unix-epoch =-17100818 83367231 - -launch-ti me-ticks=6 395660630 --mojo-pla tform-chan nel-handle =3580 --fi eld-trial- handle=122 8,i,126005 8409961077 0697,13500 4715821566 80375,2621 44 --enabl e-features =MojoIpcz /prefetch: 1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 4544 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --d isable-gpu -compositi ng --lang= en-GB --de vice-scale -factor=1 --num-rast er-threads =2 --enabl e-main-fra me-before- activation --rendere r-client-i d=7 --js-f lags="--ha rmony-weak -refs-with -cleanup-s ome --expo se-gc --ms -user-loca le=en_CH" --time-tic ks-at-unix -epoch=-17 1008188336 7231 --lau nch-time-t icks=63966 49396 --mo jo-platfor m-channel- handle=397 6 --field- trial-hand le=1228,i, 1260058409 9610770697 ,135004715 8215668037 5,262144 - -enable-fe atures=Moj oIpcz /pre fetch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 1396 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --embedd ed-browser -webview=1 --webview -exe-name= BotMaster. exe --webv iew-exe-ve rsion=5.8. 0.1 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- noerrdialo gs --embed ded-browse r-webview- dpi-awaren ess=0 --en able-featu res=MojoIp cz --mojo- named-plat form-chann el-pipe=37 36.6896.10 6847774642 87357477 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 404 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=c rashpad-ha ndler --us er-data-di r=C:\Users \user\AppD ata\Roamin g\BotMaste r\DefaultP rofiles\EB WebView /p refetch:7 --monitor- self-annot ation=ptyp e=crashpad -handler - -database= C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView\Cras hpad --ann otation=Is OfficialBu ild=1 --an notation=c hannel= -- annotation =chromium- version=11 7.0.5938.1 32 "--anno tation=exe =C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --annota tion=plat= Win64 "--a nnotation= prod=Edge WebView2" --annotati on=ver=117 .0.2045.47 --initial -client-da ta=0x160,0 x164,0x168 ,0x13c,0x1 a0,0x7ffdf b318e88,0x 7ffdfb318e 98,0x7ffdf b318ea8 MD5: 9909D978B39FB7369F511D8506C17CA0) - aspnet_compiler.exe (PID: 7112 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\aspn et_compile r.exe MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - aspnet_compiler.exe (PID: 6276 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\aspn et_compile r.exe MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - aspnet_compiler.exe (PID: 5928 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\aspn et_compile r.exe MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - schtasks.exe (PID: 2416 cmdline:
C:\Windows \System32\ schtasks.e xe" /creat e /f /RL H IGHEST /sc minute /m o 1 /tn "X Client" /t r "C:\User s\user\App Data\Roami ng\XClient .exe MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 2896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- XClient.exe (PID: 7040 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 5436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- WinUpdate.exe (PID: 7036 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 6916 cmdline:
"C:\Window s\SysWOW64 \cmd.exe" /k START " " "C:\User s\user\App Data\Local \WinUpdate .exe" & EX IT MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WinUpdate.exe (PID: 4416 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 6708 cmdline:
"C:\Window s\System32 \cmd.exe" /c powersh ell set-mp preference -exclusio npath C:\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1448 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4812 cmdline:
powershell set-mppre ference -e xclusionpa th C:\ MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- XClient.exe (PID: 1836 cmdline:
"C:\Users\ user\AppDa ta\Roaming \XClient.e xe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 2028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 7068 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- XClient.exe (PID: 2336 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 3228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- WinUpdate.exe (PID: 5268 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2)
- XClient.exe (PID: 6184 cmdline:
"C:\Users\ user\AppDa ta\Roaming \XClient.e xe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 6240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["title-formula.at.ply.gg"], "Port": "15762", "Aes key": "<123456789>", "Install file": "USB.exe", "Version": "XWorm V5.0"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 26 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | ||
Click to see the 12 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp: | 03/10/24-17:32:22.814457 |
SID: | 2852923 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:24.712981 |
SID: | 2852874 |
Source Port: | 15762 |
Destination Port: | 49734 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:30:45.329887 |
SID: | 2853192 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:24.712981 |
SID: | 2852870 |
Source Port: | 15762 |
Destination Port: | 49734 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:06.998086 |
SID: | 2855924 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |