General
-
Target
ss.bat
-
Size
9KB
-
Sample
241227-v319paxmb1
-
MD5
36b1271ce5d09beadb5c5b4245a7de19
-
SHA1
e288980e436228f5518661e284a8503ceca7c66f
-
SHA256
1e0ee014e2d7558b63fe4408fadf2bf12aa2a3f84c51e2ce8c96503f596a0c41
-
SHA512
d56df31d2e1c8168fdcc2f86bc46e86d53d3ca45c2efaab2c63aab8d12279039107de6009df9190927ddeff7928507ad3da40592d5bbc36ebe3a38cbacad14f2
-
SSDEEP
96:Krn8k1pQzTgo+ApZIFOgxUZcp0IvUeh+v1jBtzM3x2LXCT+fjljWWGVRn+uUdKFQ:+20GYWJGWA0
Static task
static1
Behavioral task
behavioral1
Sample
ss.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ss.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
event-dollar.gl.at.ply.gg:42627
Vu8KDOzYd19RAWuh
-
Install_directory
%ProgramData%
-
install_file
Desktop Window Manager.exe
-
telegram
https://api.telegram.org/bot7269786725:AAF0IPx1BWTdW_vbZqP8HGNrxWWFpF5CvYs/sendMessage?chat_id=5465523859
Extracted
quasar
1.4.1
newoffice
117.18.7.76:3782
d908c8ed-ea88-484e-a3d2-dcbe66ac7cfc
-
encryption_key
FD2DE574AF7E363A5304DF85B3475F93A948C103
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
ss.bat
-
Size
9KB
-
MD5
36b1271ce5d09beadb5c5b4245a7de19
-
SHA1
e288980e436228f5518661e284a8503ceca7c66f
-
SHA256
1e0ee014e2d7558b63fe4408fadf2bf12aa2a3f84c51e2ce8c96503f596a0c41
-
SHA512
d56df31d2e1c8168fdcc2f86bc46e86d53d3ca45c2efaab2c63aab8d12279039107de6009df9190927ddeff7928507ad3da40592d5bbc36ebe3a38cbacad14f2
-
SSDEEP
96:Krn8k1pQzTgo+ApZIFOgxUZcp0IvUeh+v1jBtzM3x2LXCT+fjljWWGVRn+uUdKFQ:+20GYWJGWA0
-
Detect Xworm Payload
-
Quasar family
-
Quasar payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
5System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1