Analysis
-
max time kernel
94s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
fg.exe
Resource
win7-20241010-en
General
-
Target
fg.exe
-
Size
394KB
-
MD5
ff7bdcc4260a35315c5a59f44fc78126
-
SHA1
8ca1960bdc5cb8f72fa2735bebc49f47676773c8
-
SHA256
757af13b416594d65a4c99362a537f13dde2a93b61ec8ba0b939c548b8973186
-
SHA512
27270cb2803fe88acb58976b8ae8daab249a1110cc8bf574c014d1f49fb1d16b9798fd48341662e2fde88a86e1230a1a8ca6da6b04c5ad51add765739d827db7
-
SSDEEP
3072:c9apijplAUVMpC5ZgEQLmefWXMRVVmLgP:FijplhMiZgEQaefeyV
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000200000001e726-14.dat family_xworm behavioral2/memory/436-15-0x0000000004E80000-0x0000000004E90000-memory.dmp family_xworm behavioral2/memory/976-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 436 set thread context of 976 436 fg.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 976 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 436 wrote to memory of 2116 436 fg.exe 89 PID 436 wrote to memory of 2116 436 fg.exe 89 PID 436 wrote to memory of 2116 436 fg.exe 89 PID 2116 wrote to memory of 1472 2116 csc.exe 92 PID 2116 wrote to memory of 1472 2116 csc.exe 92 PID 2116 wrote to memory of 1472 2116 csc.exe 92 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93 PID 436 wrote to memory of 976 436 fg.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\fg.exe"C:\Users\Admin\AppData\Local\Temp\fg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hrdwu2lx\hrdwu2lx.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9EC0.tmp" "c:\Users\Admin\AppData\Local\Temp\hrdwu2lx\CSC1B655F94BABD443CA4A345B515418E8A.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD582adb7b6873990b8e59b374eb5e946e0
SHA1da685addd5acf8366f7a315fe983fe17bb775542
SHA25666ed5f8c71f2ec1003ac899f618807da5986beb5c8cb884ba85409b90a28c093
SHA512aeedf982cbb2821e06b9cb79d0eecc48f133fe247f628334eea5b69d0c42ff4ba805f2789e4a7c393ddc33642e1e70fa1ed80941466366ef4250440576c46a92
-
Filesize
42KB
MD56bedebd51c7df8c932f414e59a0468e9
SHA1f52959b797c18aa9bfbbc6422006ea92b33e5c5e
SHA2568e2c6d5d155c210dd15d8e718804b0429f8f964e91cd23acb44a118c7876202e
SHA512767188390d7c119abb19c1dcc767f6331da0e861156f0ba0a21e57b914b8f4b26d0bb84e041dc11c683407c31fa0afad10707e8f2e51d6e5f4af9f594b4b7887
-
Filesize
652B
MD59941c80d5a68211a08179b8b66aeed37
SHA159e090f9ef29e8801567b5e9308101238674b282
SHA25698f0b0b72a1ce8c0ba9858a07b8781253dd803a8e4a84c8f4f79c4ee5c281023
SHA512900c09dd8c1748ce43190849c81685c26ffe8f2d75239d40baec84150508da08c69238376438ed5a5c451e90e0b9e7ddfc6786ef1e71c313823da9e0b05988c2
-
Filesize
103KB
MD5410888111f8a84cb88bea4b9876f8150
SHA12be368fa85db49d40df8a9346aacfec9c2188cd8
SHA256edfdbfd4002ea7d3bf87660ad84259b343f2927e9ae31dd36a48dae2547c0adf
SHA512c33cc37ca495245f0dcc37b0d4e7852d3c9b28fdc240a9bdd634e5b3dce05835d9c306987eae0a65712d29550ca8aeeb1d8708731b73b8551c02d97f4ae6fa06
-
Filesize
204B
MD51e08e5b949c07db37256b5cb5f33f132
SHA14d3d452ba1aa9ad4b28d8894c82682a405234b43
SHA256f95a540cf3aa7473939c13c7c68cf39dc17fee0badae98710fa3e16a21a4572e
SHA51295e0b837a04c6928e5f3bcef937dcbdf9e1a0c8d688259d0e48f85734a914dccf338aee16a7c1407510939ec1a34aed867b42289394b8d8509e9a7ce4561f859