General
-
Target
Fixer.bat
-
Size
467KB
-
Sample
240605-wyzezadh9z
-
MD5
5f0e4cb9b6a397276db755cd1169fa32
-
SHA1
22008641cc8b5f93e4bd0478a68ff45baafea330
-
SHA256
3ec79e48ef928730e924d3496ce7fd12b62708929082d3d638baad732bbbc94f
-
SHA512
86667685d1be00734e47f643242a0fd1287232c2b8d056e6c424aa9d16625c51800232399f62ca29038b562ac240698beb5584f0b5d9f13f80e28db63ff0bf91
-
SSDEEP
6144:l8rDor88FckODv9vZSGgNd8aWiWisafXRZHNfQUiXhu5+vQnN0phHeXQY492TOR:2QnckODBsPyaXXbHN4U98iN08Xo2w
Static task
static1
Behavioral task
behavioral1
Sample
Fixer.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Fixer.bat
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
pa-nitrogen.gl.at.ply.gg:62957
uBSYttj1y6tsldI6
-
Install_directory
%Temp%
-
install_file
svchost.exe
Targets
-
-
Target
Fixer.bat
-
Size
467KB
-
MD5
5f0e4cb9b6a397276db755cd1169fa32
-
SHA1
22008641cc8b5f93e4bd0478a68ff45baafea330
-
SHA256
3ec79e48ef928730e924d3496ce7fd12b62708929082d3d638baad732bbbc94f
-
SHA512
86667685d1be00734e47f643242a0fd1287232c2b8d056e6c424aa9d16625c51800232399f62ca29038b562ac240698beb5584f0b5d9f13f80e28db63ff0bf91
-
SSDEEP
6144:l8rDor88FckODv9vZSGgNd8aWiWisafXRZHNfQUiXhu5+vQnN0phHeXQY492TOR:2QnckODBsPyaXXbHN4U98iN08Xo2w
Score10/10-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-