Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
Sukioshe.API.bat
Resource
win10v2004-20250217-en
General
-
Target
Sukioshe.API.bat
-
Size
102KB
-
MD5
378a551aa3a4c5e0adec167eaa224b24
-
SHA1
0f55fd5a8bae0149321975f44599314ca96d954d
-
SHA256
0b6f399b1b5e976944d903b553343fa00c0af1dacecfcb161b7018c3282c8c8d
-
SHA512
a291af2e59ac3db474a6139b6ce2d672d6c556a61bc7ec0360e32565d93c5a1d8c71b7306826232fb78749b6b0a72787763b7ca94e2cda38b0afbcb9ab0e890e
-
SSDEEP
1536:y1YNBiAGQ4g3JGPFSutTsn5zr73oWiA6WwprhyIha1CjRAoH28oKN34rmeeS3BQe:Hf0Qn3CFSutIHwp9yJCj+oWC45eWKe
Malware Config
Extracted
xworm
45.88.91.101:7000
-
Install_directory
%AppData%
-
install_file
win32.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023d61-4.dat family_xworm behavioral1/memory/820-7-0x0000000000990000-0x00000000009A8000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 820 embedded.exe -
pid Process 3672 certutil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 820 embedded.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3672 3564 cmd.exe 88 PID 3564 wrote to memory of 3672 3564 cmd.exe 88 PID 3564 wrote to memory of 820 3564 cmd.exe 90 PID 3564 wrote to memory of 820 3564 cmd.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sukioshe.API.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\certutil.execertutil -decode "C:\Users\Admin\AppData\Local\Temp\embedded.b64" "C:\Users\Admin\AppData\Local\Temp\embedded.exe"2⤵
- Deobfuscate/Decode Files or Information
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\embedded.exe"C:\Users\Admin\AppData\Local\Temp\embedded.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD51295e2412bafad04d40296c30e863a57
SHA1510bd48bb534ed067c4173c3f101652b97d70c81
SHA256940c1d404fb9824f5c2f549098c99e4001fd8dd60ca47ea2d7d9aeff9654f533
SHA51251fb977c758466d08d53875e0eecde03b98015b98843756975739019d4e0b5ed2b632f56b2d719bd4f53c9aeb6576315f910079a1a20876ed7279b6bef80f18c
-
Filesize
69KB
MD56ce124f705bb296be16f329d0e4be099
SHA1f7c01f22ecbfae4e6f2c297c29770b52d2db3ad9
SHA25643c7837200a3d03c1de24f2be3d7ea78921296c01dcd74177dfb1b8a0e505440
SHA51248cad8c2494b021c81d8549c53a1ab015195081afe90c781a6bda56dbcd9242035dd634ec08579ae73ad0bac8a2e383c3eeee94f5cd629f8111a638d05f4067a