Resubmissions
25-08-2024 04:35
240825-e763qsvdnh 125-08-2024 04:35
240825-e7zzesvdmh 1017-08-2024 23:21
240817-3b5f2awbjn 1017-08-2024 23:03
240817-21rqssvdpq 1017-08-2024 06:42
240817-hge34sscnc 1017-08-2024 06:24
240817-g6j8pa1gkg 1017-08-2024 05:49
240817-gh7dbatbrp 1017-08-2024 03:15
240817-dr4f8sthpe 10General
-
Target
systemruntimes.bat
-
Size
3.0MB
-
Sample
240817-hge34sscnc
-
MD5
6c546242564cda9fc4fee896e366cacd
-
SHA1
3a753043686d6da8cb7fbd193fe2179ce4727b03
-
SHA256
09074b2fe4ff12e79e75f850359a3ee191027ebf39e4a6c0ea7e70dcadc0c2d1
-
SHA512
2d932be458f773054bb175d531a20b1b0aebc10f2ecac0d2f2de364f9c6be9661e49fb29f6159092e46d7340fc361560eb121405625ae8a4c46594f9acf92222
-
SSDEEP
12288:Iqly9ZqhqhqhqhqhqhqClypypypypy/lBu0jAJgtfEoMCxqC6EyAnMFU/pv:IIyZ888888BOOOOq/u1gQwqbAM4v
Static task
static1
Behavioral task
behavioral1
Sample
systemruntimes.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
a9DusJ8RwQTWHwj3
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/jkmUR9iK
Targets
-
-
Target
systemruntimes.bat
-
Size
3.0MB
-
MD5
6c546242564cda9fc4fee896e366cacd
-
SHA1
3a753043686d6da8cb7fbd193fe2179ce4727b03
-
SHA256
09074b2fe4ff12e79e75f850359a3ee191027ebf39e4a6c0ea7e70dcadc0c2d1
-
SHA512
2d932be458f773054bb175d531a20b1b0aebc10f2ecac0d2f2de364f9c6be9661e49fb29f6159092e46d7340fc361560eb121405625ae8a4c46594f9acf92222
-
SSDEEP
12288:Iqly9ZqhqhqhqhqhqhqClypypypypy/lBu0jAJgtfEoMCxqC6EyAnMFU/pv:IIyZ888888BOOOOq/u1gQwqbAM4v
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1