Analysis
-
max time kernel
113s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
a.ps1
Resource
win7-20240903-en
General
-
Target
a.ps1
-
Size
779B
-
MD5
209a0dcfb7e176365dc8f9a00dec716a
-
SHA1
aac44bda989e764f25277e7ed2b6680c781d704e
-
SHA256
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141
-
SHA512
354491ae39042832f2b419a85ffbb45e1159a35aa124cfb61c3ec47ba70da176f4bffe1a089f4dfa55ee3f76525cc6f1a204a84b153d44eb143ea6a6780f687b
Malware Config
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0003000000022b4f-25.dat family_xworm behavioral2/memory/2080-26-0x000002C2C2730000-0x000002C2C2740000-memory.dmp family_xworm behavioral2/memory/4352-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2080 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 5 2080 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2080 set thread context of 4352 2080 powershell.exe 96 -
pid Process 2080 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 powershell.exe 2080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 4352 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2548 2080 powershell.exe 93 PID 2080 wrote to memory of 2548 2080 powershell.exe 93 PID 2548 wrote to memory of 1184 2548 csc.exe 95 PID 2548 wrote to memory of 1184 2548 csc.exe 95 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96 PID 2080 wrote to memory of 4352 2080 powershell.exe 96
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a.ps11⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oqa2o05u\oqa2o05u.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC39E.tmp" "c:\Users\Admin\AppData\Local\Temp\oqa2o05u\CSC676EEF80AD7F412BABFD94306BCA72A.TMP"3⤵PID:1184
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576cccd40588eba983be739d383256c2d
SHA1c8f2b4ec469f23106272cce32809f3d91f92d30d
SHA256675dcb61e98cf62f410b94165e615f80a52e56f6d1290b5b24f95c4626f4b203
SHA51207a6ebd81d40bd412c05cf758fcd161f5bd8be3e83e6c063f6f06c84dec85b20ff19661e51e3f216d7fd774c5b92115ed3ca3299bb96fac17e3766000857a070
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD52e9ca220ac6542facee84931253b6df8
SHA195a755b8846bbdb412687d4fbc7421abda0b35ec
SHA25603079cfb009ff4021ccdaa43dfafad3015086a1f1453617c0f83fe60c5e7e362
SHA5128458ab489387cf904955140d6710f4d32875ffb2efd53156300c70e669dbca848b82d937f24a7509b237e25f320ec90d228654725c15e8cff6a98c9defb0c648
-
Filesize
652B
MD5773d2383b6d676c69e2e66cb83938630
SHA1b874c82bba7442233593f9b2ca4722575e894c98
SHA2567280fe70143b6df0c5a17d7b657b169df9d08dc8864351a850a2633ab1d4b95c
SHA512f2e2629a353045f34010ac77b3b3a7b42de0560b4b93e289e15dad6b5ea3ea0a901041c4369401a79310d3c7ed8596c866adfd048125afa47263e9268d4b3941
-
Filesize
103KB
MD5992ab26a03ded91714491d267da55fb2
SHA125fe04d5493f7e904bd4e64078aa464226e8f393
SHA2563b18772dbf088171f78cccd3da6fb05f46918b2bafa17ab43ea03ec0507935c1
SHA512a1dbfd27e02d10e978475bf9c1279c489e1c9febd8456492e2b0d7df33563c4e81cc28e39f6a90aa82cadc06927bce2f831f2089b5e57da4ea89862a6d82ad0f
-
Filesize
204B
MD5b3b06352e69755172f009e4cf8216fa5
SHA147f11ea04adab2c8c27445a00f1a44b1ea70fd53
SHA2561cbbd10bf13e3163abb46732189024c44b2495f8783be24f96d9b643c671c7e1
SHA51288e9dca4710adfab0bcfdecf206688d9f5715a248af896990b2a6aa14496d633baed4980a626321f8393851dd4923625dd72a1cfbf5351d82249c539d1eec5a3