Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
yr.exe
Resource
win7-20240903-en
General
-
Target
yr.exe
-
Size
394KB
-
MD5
9daf267f412e5c38116989762a9cf145
-
SHA1
809fad1c6bf61546ea05188dfedbde4bad0f98a1
-
SHA256
713a9ec5fe2a81686942a159c168027da5910e72fd52d914cf8e6fc0a2cdb0e5
-
SHA512
0115e5c5cfa324615fba5dbc4b9f3c915195f26bfdc1598ebf1bd3291582410f7cee46d2296d34165e9115b4cafcd74e2e88eca55cbdb8a8009901b9d8ffd88b
-
SSDEEP
12288:TxjwN1WoADQEwTKOZ2+i/qW83wfeuLhDhyO6T1GdcdcgL5i:d
Malware Config
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000c000000023b42-14.dat family_xworm behavioral2/memory/4396-15-0x00000000009F0000-0x0000000000A00000-memory.dmp family_xworm behavioral2/memory/2028-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4396 set thread context of 2028 4396 yr.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4396 wrote to memory of 2996 4396 yr.exe 93 PID 4396 wrote to memory of 2996 4396 yr.exe 93 PID 4396 wrote to memory of 2996 4396 yr.exe 93 PID 2996 wrote to memory of 5052 2996 csc.exe 95 PID 2996 wrote to memory of 5052 2996 csc.exe 95 PID 2996 wrote to memory of 5052 2996 csc.exe 95 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96 PID 4396 wrote to memory of 2028 4396 yr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\yr.exe"C:\Users\Admin\AppData\Local\Temp\yr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wq4enfxe\wq4enfxe.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB3EE.tmp" "c:\Users\Admin\AppData\Local\Temp\wq4enfxe\CSC781F8A5C49B045DEA141C2E79B34E16.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD506170545d5827b3258e5d8178969a4cd
SHA173ea8ffbea6b91aa8873ef7d5ffa3be3ead367cd
SHA256c4a459e6150d5f70b2f6e849ed795038a70b5e2f86cbf8643b66d537f0e8973a
SHA512c4b9349b257b915eef9d267b4e884d5d2742bf0d9fd6a730980e55aa6345da287a39f2b7cec07b32c8409c5f84adda79d99e79578cc6c78a9d2e673d30bd3daf
-
Filesize
42KB
MD59b872a538e52972e87daf6c5e0a69f82
SHA135bc47380e987f199b5bff270f464c28fef8346d
SHA256be707b5b594bb06768de0c9469ec1ea3646830b46788a722cc3b5764041fa5b5
SHA51241ec66431f868c9830624f9e358dea9a305215a8908cc666fa4df1c48bc22f27113331cd622f82dedc04264f0bb541016e3e660ecc10c74d5bd74a0953a40713
-
Filesize
652B
MD5cd98d017ff056138f48287e31d69f015
SHA1af092f0f1771e4afda9be400f0906ea3e0c3dae5
SHA25621b3abb777265f54361c1e10755cba214cbb94f90bdf06f15060d05f1bc43e89
SHA51229e2e94004d44878d5d194155f9e7ba276585c24f4510b824ae2672fe1ad22e563b96cb8abcc1b04d1259c8fe985ba91f400e2dc9dbc75b1f7eae20e5489d860
-
Filesize
103KB
MD5992ab26a03ded91714491d267da55fb2
SHA125fe04d5493f7e904bd4e64078aa464226e8f393
SHA2563b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1
SHA512a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f
-
Filesize
204B
MD5e3c514e7dc2ba517226bac5579423f84
SHA1c59cd6840c763664c335cd26034b0a1af7ac4e2a
SHA25611ad7d4ab48fc32af1a17f927dbc07b77d403df40adda9f6d29ae06f3bf44ee1
SHA51203f425248ef633147a80d7800b85a9796a31bcd51c42b61bedd04a990f04376e7d773ed1ed8778b3f8fe864ca7ddef58c32d837b152cda1f0209e8a9827d6383