General

  • Target

    ClearAndInject.bat

  • Size

    2KB

  • Sample

    241004-cf68baycnn

  • MD5

    80a145da53a3b0464d43788b92be91a3

  • SHA1

    95cf71d9ec4f96e5e3681320834fad48c78f175d

  • SHA256

    e1511c0415bf9b916139ab2233f2120b52dd90890533b517f62ea86736c41b14

  • SHA512

    77ae218d906d68e619e1e12dd71d6af3f799de0c40fd312ea5bb3be0ca1f9fe9336e2161782a60e0e0ef4064c3b7fd9769cd1cd23ab31740ca916b457e548245

Malware Config

Extracted

Family

xworm

C2

week-neck.gl.at.ply.gg:7880

Mutex

qKpagtL9KKLe5LUM

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      ClearAndInject.bat

    • Size

      2KB

    • MD5

      80a145da53a3b0464d43788b92be91a3

    • SHA1

      95cf71d9ec4f96e5e3681320834fad48c78f175d

    • SHA256

      e1511c0415bf9b916139ab2233f2120b52dd90890533b517f62ea86736c41b14

    • SHA512

      77ae218d906d68e619e1e12dd71d6af3f799de0c40fd312ea5bb3be0ca1f9fe9336e2161782a60e0e0ef4064c3b7fd9769cd1cd23ab31740ca916b457e548245

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks