Analysis
-
max time kernel
30s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
fg.exe
Resource
win7-20250207-en
General
-
Target
fg.exe
-
Size
394KB
-
MD5
ff7bdcc4260a35315c5a59f44fc78126
-
SHA1
8ca1960bdc5cb8f72fa2735bebc49f47676773c8
-
SHA256
757af13b416594d65a4c99362a537f13dde2a93b61ec8ba0b939c548b8973186
-
SHA512
27270cb2803fe88acb58976b8ae8daab249a1110cc8bf574c014d1f49fb1d16b9798fd48341662e2fde88a86e1230a1a8ca6da6b04c5ad51add765739d827db7
-
SSDEEP
3072:c9apijplAUVMpC5ZgEQLmefWXMRVVmLgP:FijplhMiZgEQaefeyV
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023b08-14.dat family_xworm behavioral2/memory/2772-15-0x0000000002EA0000-0x0000000002EB0000-memory.dmp family_xworm behavioral2/memory/6044-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 6044 2772 fg.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 6044 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3736 2772 fg.exe 89 PID 2772 wrote to memory of 3736 2772 fg.exe 89 PID 2772 wrote to memory of 3736 2772 fg.exe 89 PID 3736 wrote to memory of 3608 3736 csc.exe 93 PID 3736 wrote to memory of 3608 3736 csc.exe 93 PID 3736 wrote to memory of 3608 3736 csc.exe 93 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94 PID 2772 wrote to memory of 6044 2772 fg.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fg.exe"C:\Users\Admin\AppData\Local\Temp\fg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4mzo51bi\4mzo51bi.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF68.tmp" "c:\Users\Admin\AppData\Local\Temp\4mzo51bi\CSC1DBF0542556D48F4955C1AF64C662535.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3608
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD56d919ee07e6a450c70a9d1aa03543160
SHA1351da7e44da4f20432946bf71f87941c37550f68
SHA2566da45eb2ada89e803d80afc3e1a1d5e2b3c196f49ceb82eed82bd088fbd711b1
SHA51223057681061b260122a466c4bf8be8cca6d9536deaf86a1d32eeebf755ce546f577143369a4dcaa23da0d29426c5cd53189e5a3a20743f6967a27c5b01830333
-
Filesize
1KB
MD5f59f6a4da35c7556accf80b11d67861d
SHA1bc616a917af62b4638e6974f285b00b3540ce647
SHA2569640d282c889432969813a06c72dfd9d741e624e9830af00f38aa008d8f840a2
SHA512bcf20cef290b433149dcb205c41a099118488af5d58c9789591a56549c5ef6c4efed08ce256100a3f0e142ed8f700cfb7050c2542bfb41994c5b17007d6bd0bc
-
Filesize
103KB
MD5410888111f8a84cb88bea4b9876f8150
SHA12be368fa85db49d40df8a9346aacfec9c2188cd8
SHA256edfdbfd4002ea7d3bf87660ad84259b343f2927e9ae31dd36a48dae2547c0adf
SHA512c33cc37ca495245f0dcc37b0d4e7852d3c9b28fdc240a9bdd634e5b3dce05835d9c306987eae0a65712d29550ca8aeeb1d8708731b73b8551c02d97f4ae6fa06
-
Filesize
204B
MD595b2b894943bcf916cd878ad6d4735eb
SHA18ea23f17f38c83f197e0927651a5042e8685a6fc
SHA2564d5c7069fab6c340b2d332a8163df20f31a16c534749718ef8a06787b213c76c
SHA5125ab0ac3909e581d6fb292b2600319dfbc5c5e50c43ddcb814a7cd75da3d22f240af15ad8f5a12b97bfb79ab21eaf9237d72fbf7109e3b4fd8b89a03e25997e24
-
Filesize
652B
MD593a107753593ae01e8af8e38e810f72e
SHA10c98608a8258aa6267d99e9fa48c0906e50f0476
SHA25627cbc8edb61148e37418875090b58add30f2ebc6eea0ef360660bc648fab0b3f
SHA512f817fcf05f7c1ed2bc7ffba45ae7f352242051db02cc12d2c96101187da6e84b9ae705ce9d8126333823baa364abef3ac90909041ac70f283db0b84c3a72f490