Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
a.ps1
Resource
win7-20241010-en
General
-
Target
a.ps1
-
Size
779B
-
MD5
209a0dcfb7e176365dc8f9a00dec716a
-
SHA1
aac44bda989e764f25277e7ed2b6680c781d704e
-
SHA256
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141
-
SHA512
354491ae39042832f2b419a85ffbb45e1159a35aa124cfb61c3ec47ba70da176f4bffe1a089f4dfa55ee3f76525cc6f1a204a84b153d44eb143ea6a6780f687b
Malware Config
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/4668-26-0x0000015AC2F40000-0x0000015AC2F50000-memory.dmp family_xworm behavioral2/files/0x000200000001e72a-25.dat family_xworm behavioral2/memory/4368-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 4668 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 6 4668 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 4368 4668 powershell.exe 94 -
pid Process 4668 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 powershell.exe 4668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4668 powershell.exe Token: SeDebugPrivilege 4368 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4472 4668 powershell.exe 90 PID 4668 wrote to memory of 4472 4668 powershell.exe 90 PID 4472 wrote to memory of 4056 4472 csc.exe 93 PID 4472 wrote to memory of 4056 4472 csc.exe 93 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94 PID 4668 wrote to memory of 4368 4668 powershell.exe 94
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a.ps11⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i4sadzte\i4sadzte.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA604.tmp" "c:\Users\Admin\AppData\Local\Temp\i4sadzte\CSC787DB32BBC694CD19F9970E7C032B08B.TMP"3⤵PID:4056
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a71c3a756c467bd879edd58e5b68047f
SHA169e66fcd1751ceae6dea4d91f3787c8280637a86
SHA2567500e829e959dd591ea180707ce41c836f3b579271772fb373daab406c3ef1b4
SHA512bcb4407fc58ea62175c94733ccfd47410c1c319139f79d6b4434da4130a5ca2d1569c1c846ec908641f624beec48ba901a3d81799b3eb85cac02a5e58e850fd5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD58f9740cdffa6f16a742ce78a37d5f50a
SHA166ea5c325aea18b0fc6e53353402558ea2b9f8ee
SHA256d72d83107607c55f08a321907f43ae3dda0d6a4c4696d534b4820315272aad5c
SHA5123cf7e8561ab39b0e1cf1e6cf6d96cb8311aa8edddcb8f3ab56e63d9c6dc526f1413ff2e535ed68cbaa719e8b413e91b6edde5c5d32e839eddf460d23d57f46a2
-
Filesize
652B
MD5d0bbf07592bbad522b4b0d7aa5f6f2d4
SHA1e1dbc08964814532867920ce7500c68f44e4ea4e
SHA2562711ce58f6a46883fece10b72340cd10a3c06b1d0032b268d0833fff461ab9d5
SHA512a861512742bdd9a2908169ae700c1715be3bc0094487615839021ab8778977cb9dd3a74344bbff752de3d19ad54774bf9860faa3dffb3edd20f7a8edc4e854ba
-
Filesize
103KB
MD5992ab26a03ded91714491d267da55fb2
SHA125fe04d5493f7e904bd4e64078aa464226e8f393
SHA2563b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1
SHA512a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f
-
Filesize
204B
MD50f20fc0260915e2602ba4c1459115480
SHA183e49a5ce9b4ff7a9b591d65feb71833ee007832
SHA256908d3e375c372cbc27329f643182bdb9fec011da8ef4613781c928f5c710726d
SHA512a0f4645aa400e355035a2ba0996453e30df1015beb0c761ae126189b8934c675f08c6713ef7c70cbcf716e177d1e39ef6d2547963a4b05cbe46e9019b3749547