General
-
Target
CZABypassmenu.bat
-
Size
385KB
-
Sample
241004-h9p4savhkd
-
MD5
a4081b4f76dc012cc7a6933130b5136d
-
SHA1
a8d85c7d88374fb628ce4484c3795cca3fc3660e
-
SHA256
d90764628aafd8e1ba1273d2a6f52513b27368805631b5c660dc2d2af590d837
-
SHA512
984f51f8cd96a05fe22ac362e55cc89511ede5af1d3165b139bdf365bc2c8bb825b87757552bf1a2316379c1326da6a502dcdfdb5d4be54d3f740d198b11aa54
-
SSDEEP
6144:E4ywd2XdIEAf+32995oVbkQDTBjkhti3gtuRhBK1bZBeHy36JCn:E4ywd4TAm3vxTTahERRLK1tULsn
Static task
static1
Behavioral task
behavioral1
Sample
CZABypassmenu.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
193.161.193.99:25993
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
CZABypassmenu.bat
-
Size
385KB
-
MD5
a4081b4f76dc012cc7a6933130b5136d
-
SHA1
a8d85c7d88374fb628ce4484c3795cca3fc3660e
-
SHA256
d90764628aafd8e1ba1273d2a6f52513b27368805631b5c660dc2d2af590d837
-
SHA512
984f51f8cd96a05fe22ac362e55cc89511ede5af1d3165b139bdf365bc2c8bb825b87757552bf1a2316379c1326da6a502dcdfdb5d4be54d3f740d198b11aa54
-
SSDEEP
6144:E4ywd2XdIEAf+32995oVbkQDTBjkhti3gtuRhBK1bZBeHy36JCn:E4ywd4TAm3vxTTahERRLK1tULsn
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1