Overview
overview
10Static
static
10Xworm2V2-V...om.ps1
windows10-2004-x64
3Xworm2V2-V...CT.vbs
windows10-2004-x64
1Xworm2V2-V...ut.vbs
windows10-2004-x64
1Xworm2V2-V...ut.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...ts.vbs
windows10-2004-x64
1Xworm2V2-V...ts.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...CB.vbs
windows10-2004-x64
1Xworm2V2-V...at.vbs
windows10-2004-x64
1Xworm2V2-V...os.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...FM.vbs
windows10-2004-x64
1Xworm2V2-V...FM.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...m1.vbs
windows10-2004-x64
1Xworm2V2-V...un.vbs
windows10-2004-x64
1Xworm2V2-V...ST.vbs
windows10-2004-x64
1Xworm2V2-V...FO.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...er.vbs
windows10-2004-x64
1Xworm2V2-V...IC.vbs
windows10-2004-x64
1Xworm2V2-V...ps.vbs
windows10-2004-x64
1Xworm2V2-V...sR.vbs
windows10-2004-x64
1Xworm2V2-V...rt.vbs
windows10-2004-x64
1Xworm2V2-V...sV.vbs
windows10-2004-x64
1Xworm2V2-V...er.bat
windows10-2004-x64
1Xworm2V2-V...ub.vbs
windows10-2004-x64
1Resubmissions
22-05-2024 02:46
240522-c9kw6shh38 10Analysis
-
max time kernel
129s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:46
Behavioral task
behavioral1
Sample
Xworm2V2-VB-Src-main/Dark Worm/Binderdom.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/ACT.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/About.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/About.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Binder.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Binder.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/BlockClients.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/BlockClients.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Builder.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Builder.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/CB.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Chat.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/DDos.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Downloader.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Downloader.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/FM.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/FM.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/FileSeacher.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/FileSeacher.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Form1.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Fun.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/HRDPST.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/INFO.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/IconChanger.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Keylogger.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/MIC.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Maps.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/PassR.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/Port.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
Xworm2V2-VB-Src-main/Dark Worm/Forms/ProcessV.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Xworm2V2-VB-Src-main/Dark Worm/Resources/Fixer.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
Xworm2V2-VB-Src-main/Dark Worm/Resources/Stub.vbs
Resource
win10v2004-20240508-en
General
-
Target
Xworm2V2-VB-Src-main/Dark Worm/Binderdom.ps1
-
Size
5KB
-
MD5
307fe0406805238ac3b7e1ba5c3f6324
-
SHA1
841f6bb0c4a7e28e08b40d70bfacdf2c5fac5a48
-
SHA256
3adffeebd4038bd1f5d498dda4909cf01f98565faa65f5f57e0842889c1070b0
-
SHA512
13bcb106798b2b295b14f2d2abd9a24f1ff7d84e48ed7134c34210ae82aa96e350c2ef77e13c3955c0d3dc9c679a29e4c1d53433e423cface0a37c79a1ddd57a
-
SSDEEP
96:AbpOg5dZ0qsBero7tHgYUWQN7WvQc7U8mQG4LQx9mtRZ/ZgZZzulcofTkKNjYH31:AHb6Bero7FodS0yG4LqwNxWZzuGof4KU
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1788 powershell.exe 1788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1788 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Xworm2V2-VB-Src-main\Dark Worm\Binderdom.ps1"1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82