Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
fg.exe
Resource
win7-20250207-en
General
-
Target
fg.exe
-
Size
394KB
-
MD5
ff7bdcc4260a35315c5a59f44fc78126
-
SHA1
8ca1960bdc5cb8f72fa2735bebc49f47676773c8
-
SHA256
757af13b416594d65a4c99362a537f13dde2a93b61ec8ba0b939c548b8973186
-
SHA512
27270cb2803fe88acb58976b8ae8daab249a1110cc8bf574c014d1f49fb1d16b9798fd48341662e2fde88a86e1230a1a8ca6da6b04c5ad51add765739d827db7
-
SSDEEP
3072:c9apijplAUVMpC5ZgEQLmefWXMRVVmLgP:FijplhMiZgEQaefeyV
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x0008000000015d8c-14.dat family_xworm behavioral1/memory/2988-15-0x00000000003D0000-0x00000000003E0000-memory.dmp family_xworm behavioral1/memory/2372-23-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2372-20-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2372-19-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2372-25-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2372-27-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2372 2988 fg.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2400 2988 fg.exe 31 PID 2988 wrote to memory of 2400 2988 fg.exe 31 PID 2988 wrote to memory of 2400 2988 fg.exe 31 PID 2988 wrote to memory of 2400 2988 fg.exe 31 PID 2400 wrote to memory of 2972 2400 csc.exe 33 PID 2400 wrote to memory of 2972 2400 csc.exe 33 PID 2400 wrote to memory of 2972 2400 csc.exe 33 PID 2400 wrote to memory of 2972 2400 csc.exe 33 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34 PID 2988 wrote to memory of 2372 2988 fg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fg.exe"C:\Users\Admin\AppData\Local\Temp\fg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qmj3j33g\qmj3j33g.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDF38.tmp" "c:\Users\Admin\AppData\Local\Temp\qmj3j33g\CSCC56282162333468C9BB894D8F5EF623.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD539a55400d461a8b9c79994af51a2f99a
SHA1e35359fc7b3fcf521c6a525182dd529cdfb17a02
SHA25605ba77e3494e3118af5e1c688d77387fe7132d64591904dcb2dee966682f54f8
SHA5124f72241652a1a75602c2ed9895dcdf7e9ecb5f039ba70156c48f8fc198e91b1230714a656ff3b44ddec995ffb4e72805718933915d36f550dd411175d822556c
-
Filesize
42KB
MD5355d365d1d638b18673137483fed4610
SHA141313177bfc96f4f3826766b6d0b00e2f2272761
SHA25669572d6622a5c3bf7e67074671edc543cb41f600f8d83b219728732dc5ffed16
SHA5128f22e23ca484de5c7a6ce07b6aedb0c40427354d4333d68189ef8bf00dd5ae255e0b831c9cc7cb06b0b7d33a581ff8eeb65a044371e39f64686fa4e1bcba1d7d
-
Filesize
652B
MD57e11a6f2b961f7bb7193711257b08858
SHA101ada3f8e2de65c7001f8dcfaf29eb952175ef3e
SHA256de4ac770bad8070afa3b1cf002e9ff4be87baaf4f702af062a32ce4453b987ad
SHA5127b54e167de5b63778181333645e4820075e218fe72e00e76da139e0b44ac202b98a3d1d35e106a7ee6ee114c7856537b5c4ca9bfaeb5cfc34b42fe8b866ab903
-
Filesize
103KB
MD5410888111f8a84cb88bea4b9876f8150
SHA12be368fa85db49d40df8a9346aacfec9c2188cd8
SHA256edfdbfd4002ea7d3bf87660ad84259b343f2927e9ae31dd36a48dae2547c0adf
SHA512c33cc37ca495245f0dcc37b0d4e7852d3c9b28fdc240a9bdd634e5b3dce05835d9c306987eae0a65712d29550ca8aeeb1d8708731b73b8551c02d97f4ae6fa06
-
Filesize
204B
MD58f17a7161faa7d600045796faee2b99e
SHA14cdfe7028fbeb5a9d85df8c3778d816939594972
SHA256740021784ae53f4d2ce574ff93575a49d20063e014a6ac0bc42bf5cf7aa2bc98
SHA512058c2a4656a4fda24cb1d716e9b283c66bb52227c7b55f399ccd1c22ca0222d0dfc7cef5f76b8c9157c3b33bda98d622ffe7147fbf09e2f57aa9685f5ce4e0ea