Analysis
-
max time kernel
119s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
js.exe
Resource
win7-20240903-en
General
-
Target
js.exe
-
Size
394KB
-
MD5
fc44a673893daac90d53e63d0f3cba69
-
SHA1
38476f091d4d53e32abf92cb961f8df5782734cb
-
SHA256
17c7d4a3d7d090646721f5a1326955c0c4471450bfb76fdeca9b256680da2e71
-
SHA512
a247d42527e4933e874710fa905a4e248fa3cdc799b863635ebcb6afabcad63b4c61c643a6bd3bc80c242d80b01459517de3bcf4548a77832d19b3a5ba054378
-
SSDEEP
12288:hQoqIEtLGnkEz0VgXVNX77gBjkgvSoitcOgvFwE0+fubk7IVcHMqXxTU9LiqVDRH:G
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023d73-14.dat family_xworm behavioral2/memory/2752-15-0x00000000054A0000-0x00000000054B0000-memory.dmp family_xworm behavioral2/memory/924-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 924 2752 js.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language js.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 924 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2752 wrote to memory of 5024 2752 js.exe 88 PID 2752 wrote to memory of 5024 2752 js.exe 88 PID 2752 wrote to memory of 5024 2752 js.exe 88 PID 5024 wrote to memory of 2584 5024 csc.exe 92 PID 5024 wrote to memory of 2584 5024 csc.exe 92 PID 5024 wrote to memory of 2584 5024 csc.exe 92 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93 PID 2752 wrote to memory of 924 2752 js.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\js.exe"C:\Users\Admin\AppData\Local\Temp\js.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mxcr2x4t\mxcr2x4t.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC49.tmp" "c:\Users\Admin\AppData\Local\Temp\mxcr2x4t\CSC85D5598140AF4A5C9B821281E3251945.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50d408edab24b3a2fcc18ab0a7599d951
SHA1743b0adfb8a608b882d9645006ff515a2406493a
SHA25630f6740324c686537341a47fd18f7b39b34afc9a6ab0a58bea37b88a854f5e90
SHA512b6a4c8ea178adba277948ad4b719f693068a25676e9c4fe7d710f674056dfef94f794f07a8d12dc068347113a6379a154432b236a3ba2579af23b14a85bc9e67
-
Filesize
42KB
MD53c9d98bba5856463fe703dc2fbfa471b
SHA17ce272ef51f8898676be191ca8c3f85c7a8334fb
SHA256d40f311ae81931cf6c3fac663d5c696d32025c60d5e85b7abcebf416a04734f9
SHA5120b04256bb2d159ecdcb4682de3cbac810e3c92de1cb3fc5f6af7dcea965c273e3107d7dcf56f4e56c869c993cb4703052d043b6e79b9ce7e42d7845658c04dfb
-
Filesize
652B
MD5327853b77b00ed063343288ad747fbb6
SHA1772ef1694aaf73e90503b08365afe0ef29e5805f
SHA2566b8935d6dcdb3d9f2f652ce493fbaf2aa0afd6bbd1a9b836e152b28c23467b7f
SHA512ac1fe04d68ae273aa121db470f47b6fbf7858cbe3cf52efa7e247acd04169261594a28cba34b8dfd29857d7b1165a64b5cb513bdea3054a815011748579884da
-
Filesize
103KB
MD5a85c09b310c91fac493ca2fe00dd2014
SHA1f00ece43ccdd820892c2c3b0b130baa06113ab61
SHA256e1ae1da5e7e56c5b43354c7ed2484f5272eb73eedcc02185cc00329ee749bae1
SHA5126547a8fe570bf00185c44ccb8009dfcdb154e63118c8a2ccb448ae3ce9dd19802a906f34aee0bb4a0e23e5869e67ea001f6d535d928ca42ead582dec0d6667ec
-
Filesize
204B
MD54a71ee74565e4a04c9fc4f435fc1751a
SHA1a520eb5f23b4b2f0cbc0e35f9caa9170d6166a34
SHA256908cbdf062630461f55bf852a78e46974329571e7d2befce473a387881b1ca2c
SHA51245bf3f0e420c6bb7502e04c708aabc308089d8efd6eb3313d40256e60426296e00b453de595f9bb999696198d5cd7fa43b0df663957bc19a05450c4a0e2f48dc