Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
c56D7_Receipt.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c56D7_Receipt.vbs
Resource
win10v2004-20241007-en
General
-
Target
c56D7_Receipt.vbs
-
Size
130KB
-
MD5
878ba89eaad87f86c7ff4e5fee1e1823
-
SHA1
8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
-
SHA256
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
-
SHA512
2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b
-
SSDEEP
3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm
Malware Config
Extracted
xworm
3.1
xwor3july.duckdns.org:9402
JIs7HXfvmVwG8wtR
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3820-600-0x0000000000800000-0x000000000080E000-memory.dmp family_xworm -
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2904 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3404 filaucioso.bat -
Loads dropped DLL 3 IoCs
pid Process 3404 filaucioso.bat 3404 filaucioso.bat 3820 filaucioso.bat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Unsurveyable197\\Busaos.pif" filaucioso.bat -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\traveskoen.ini filaucioso.bat -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3820 filaucioso.bat -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3404 filaucioso.bat 3820 filaucioso.bat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3404 set thread context of 3820 3404 filaucioso.bat 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language filaucioso.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language filaucioso.bat -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000d000000023b30-3.dat nsis_installer_1 behavioral2/files/0x000d000000023b30-3.dat nsis_installer_2 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3820 filaucioso.bat -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3404 filaucioso.bat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3820 filaucioso.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3820 filaucioso.bat -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3404 2904 WScript.exe 96 PID 2904 wrote to memory of 3404 2904 WScript.exe 96 PID 2904 wrote to memory of 3404 2904 WScript.exe 96 PID 3404 wrote to memory of 3820 3404 filaucioso.bat 100 PID 3404 wrote to memory of 3820 3404 filaucioso.bat 100 PID 3404 wrote to memory of 3820 3404 filaucioso.bat 100 PID 3404 wrote to memory of 3820 3404 filaucioso.bat 100 PID 3404 wrote to memory of 3820 3404 filaucioso.bat 100
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c56D7_Receipt.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\ProgramData\filaucioso.bat"C:\ProgramData\filaucioso.bat"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\ProgramData\filaucioso.bat"C:\ProgramData\filaucioso.bat"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5f3a3332b13baa50c41644b86efdf0fe4
SHA1f3b91aa55b8dce62cb614e2a43d8e3973b1d47b6
SHA2567fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970
SHA51246808e4d79d0d1fbe2835456daf31e0de9e8f296b7863f38400eaa03fbf33be450f92df16f9b77ac5bb95aa33a97d484c1c678891c6e13b151f9cb7865c99be7
-
Filesize
3B
MD54e27f2226785e9abbe046fc592668860
SHA128b18a7f383131df509f7191f946a32c5a2e410c
SHA25601a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA5122a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb
-
Filesize
5B
MD5e2fecc970546c3418917879fe354826c
SHA163f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA5123c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a
-
Filesize
10B
MD59a53fc1d7126c5e7c81bb5c15b15537b
SHA1e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1
-
Filesize
1B
MD58ce4b16b22b58894aa86c421e8759df3
SHA113fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA2568254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA5122af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25
-
Filesize
70B
MD5f603843c4b1146c576a2c9e0826de265
SHA15de71ba33c20cfb74c19c706a4a44706d78fb102
SHA256ada9d1ffc0e78d2e2c05290b4ba1b1b04bc9c97a8f8e084ae0d49e36a9bb9c0c
SHA5127a5a8ebc1c12193783ae711eb4716c1a2e52d1c4799dcd7f2a29924c246b1c665f456de3eaffd5e9cd7f42e788009e2798d1121c8d695698c86349bff17d5e8a
-
Filesize
74B
MD516d513397f3c1f8334e8f3e4fc49828f
SHA14ee15afca81ca6a13af4e38240099b730d6931f0
SHA256d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA5124a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3
-
Filesize
15B
MD5cf7be2840455491f249648c44a1dc759
SHA19863c7f04f9d674365fe23f257ba43447f985e8e
SHA256769c7c2ec9413a771a2f497862194dfb0200452f3a20f5e1f77ad0b6ae535697
SHA51283984674c9e337bda5ac88c3b2d0e426fd9051e1585b95ea99b3c569ace50900f811e664da9cf426f080837e2b48a5709003b7e5d25382a1ad90026b40777abd
-
Filesize
27B
MD5b93641813851b1ad166b8163e5aeddc9
SHA1642d989ceea62bcfd70fb74f3c62ade0c1c41d78
SHA2561628c6bee5afc85044309f45e34190bc9ce8bd9516e30792460e14362657d42d
SHA512eee31a0d51df3a7ba35ab4025f8d458c4d12b6f46412982ad34aef31d9e83c7070056a07777ed4b62fb3b92b376b618099374901ffe4f988fe0f853a0e57c8ec
-
Filesize
28B
MD52490402a1d7d19949dd2a237b95af06f
SHA19a960e98c750e3fc7e44cdd6e1af20e690d893b1
SHA256bb92b5197bb4677950b78f816a8170797d0392af55e31d0f0744fe9c99f7e9b8
SHA512f3d299910eee8e8ace51ae3e7d79d12f7f68bfbcdaa0d7b8b66d505c4bdba7d95a97aeefc9f22868989115a99f81e0e3e9480e0d3e9af5fa27d2d9b0e961b52e
-
Filesize
36B
MD5056fd9e747f45f72c12ed185db65ca8f
SHA196b9e5254b0c249a3393008a3fb160b18319532b
SHA256b46a1b647cd0ac5d5ed27381e1559a8ed6244c5bb7a0d27a41ab1784c40bef85
SHA51293f9577f9226d4c090034d81735a61a4505da2068e207d5885452637bfcf87f434278e58db281bce79d49e0d941bf3ead9550541b459fad386a7dd60e24c4446
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
2B
MD525bc6654798eb508fa0b6343212a74fe
SHA115d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA2568e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA5125868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898
-
Filesize
6B
MD550484c19f1afdaf3841a0d821ed393d2
SHA1c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA2566923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b
-
Filesize
7B
MD567cfa7364c4cf265b047d87ff2e673ae
SHA156e27889277981a9b63fcf5b218744a125bbc2fa
SHA256639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA51217f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b
-
Filesize
8B
MD5c3cb69218b85c3260387fb582cb518dd
SHA1961c892ded09a4cbb5392097bb845ccba65902ad
SHA2561c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA5122402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422
-
Filesize
9B
MD52b3884fe02299c565e1c37ee7ef99293
SHA1d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe