Analysis

  • max time kernel
    2s
  • max time network
    3s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 13:44

General

  • Target

    Sukioshe.API.bat

  • Size

    102KB

  • MD5

    378a551aa3a4c5e0adec167eaa224b24

  • SHA1

    0f55fd5a8bae0149321975f44599314ca96d954d

  • SHA256

    0b6f399b1b5e976944d903b553343fa00c0af1dacecfcb161b7018c3282c8c8d

  • SHA512

    a291af2e59ac3db474a6139b6ce2d672d6c556a61bc7ec0360e32565d93c5a1d8c71b7306826232fb78749b6b0a72787763b7ca94e2cda38b0afbcb9ab0e890e

  • SSDEEP

    1536:y1YNBiAGQ4g3JGPFSutTsn5zr73oWiA6WwprhyIha1CjRAoH28oKN34rmeeS3BQe:Hf0Qn3CFSutIHwp9yJCj+oWC45eWKe

Malware Config

Extracted

Family

xworm

C2

45.88.91.101:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    win32.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sukioshe.API.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\system32\certutil.exe
      certutil -decode "C:\Users\Admin\AppData\Local\Temp\embedded.b64" "C:\Users\Admin\AppData\Local\Temp\embedded.exe"
      2⤵
      • Deobfuscate/Decode Files or Information
      PID:3672
    • C:\Users\Admin\AppData\Local\Temp\embedded.exe
      "C:\Users\Admin\AppData\Local\Temp\embedded.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\embedded.b64

    Filesize

    93KB

    MD5

    1295e2412bafad04d40296c30e863a57

    SHA1

    510bd48bb534ed067c4173c3f101652b97d70c81

    SHA256

    940c1d404fb9824f5c2f549098c99e4001fd8dd60ca47ea2d7d9aeff9654f533

    SHA512

    51fb977c758466d08d53875e0eecde03b98015b98843756975739019d4e0b5ed2b632f56b2d719bd4f53c9aeb6576315f910079a1a20876ed7279b6bef80f18c

  • C:\Users\Admin\AppData\Local\Temp\embedded.exe

    Filesize

    69KB

    MD5

    6ce124f705bb296be16f329d0e4be099

    SHA1

    f7c01f22ecbfae4e6f2c297c29770b52d2db3ad9

    SHA256

    43c7837200a3d03c1de24f2be3d7ea78921296c01dcd74177dfb1b8a0e505440

    SHA512

    48cad8c2494b021c81d8549c53a1ab015195081afe90c781a6bda56dbcd9242035dd634ec08579ae73ad0bac8a2e383c3eeee94f5cd629f8111a638d05f4067a

  • memory/820-6-0x00007FFD9E2E3000-0x00007FFD9E2E5000-memory.dmp

    Filesize

    8KB

  • memory/820-7-0x0000000000990000-0x00000000009A8000-memory.dmp

    Filesize

    96KB