Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
a.ps1
Resource
win7-20241010-en
General
-
Target
a.ps1
-
Size
509B
-
MD5
5ffc54e178b40c65b7d2fb357492baf5
-
SHA1
d59d533638f1a755fc37129796e7731ccb6206a8
-
SHA256
7fe172c67413d3bcc1b2ae93b2cbd21eec0aa8a31198828c7dc04a310f9677cc
-
SHA512
57bcc6b7e00d4638db2d99aef02d5c06c67aee0250db7c3b23fbafa0aaeca0e0df90df1d7258a9ba65db4077ed8548a7e7b391706e28086958e8d9d087d5111c
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023be5-25.dat family_xworm behavioral2/memory/2808-26-0x000001A3EE1C0000-0x000001A3EE1D0000-memory.dmp family_xworm behavioral2/memory/1920-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2808 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 4 2808 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 1920 2808 powershell.exe 95 -
pid Process 2808 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 powershell.exe 2808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 1920 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4216 2808 powershell.exe 93 PID 2808 wrote to memory of 4216 2808 powershell.exe 93 PID 4216 wrote to memory of 4816 4216 csc.exe 94 PID 4216 wrote to memory of 4816 4216 csc.exe 94 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95 PID 2808 wrote to memory of 1920 2808 powershell.exe 95
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a.ps11⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\thfaitcb\thfaitcb.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDC75.tmp" "c:\Users\Admin\AppData\Local\Temp\thfaitcb\CSC375EB28CB4904D0798363852F8AD662A.TMP"3⤵PID:4816
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568518deb9a6bf05ca6fe7e08ec3e177c
SHA1d66be1689357b5fa0e228f9fd2028ccdf123a41b
SHA25644fe51477a194d072128be6cf8b15ae15949ad95a683347d69446c5b7f5c7228
SHA512e581b134c5376e1f2a16e7c4a6d2e6dd0250a91c67c5ddbe93a3255c4fcbf19dc2d7ca2e76e33f3b1fd7d463a5abec090cf63ff2f592be66fca54dce88b85fb8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD50fc4b5749a689bf28460eed71046bd5f
SHA1a9999cd742dadd45fb25843b0311500eb7662909
SHA25660dd1f933ed0eba7b2a5cfb7c1073d8ba65b5c4aa1c753c87e3d169be43d99ca
SHA5123e88f98c417a0fe5d21b12bcccaa91b58513a07702ed0beb23013f35871f0464f65bb75e2bf9e46359656e783fae80a0b88d41c9a379cbe3d9e8f69f1ad1f65f
-
Filesize
652B
MD58fff27260f1321bbeaa7fea62486432b
SHA1026a1d5d9f37bbe2408ddb14507797dcb682d053
SHA256de83c9d6d4e83106503cced7c060eabdb61fa8d2809667753e2c154c30029872
SHA5123e986f4a472db8a9ab4306f66bb9de9b96387096846391fb0c1020381dffb4b947289f6058dea0296ada86e1ea1dd8bbd130cde476a39cba9555878c5a2ffc18
-
Filesize
104KB
MD54c235e59a96c8c09a6f7e97b95772164
SHA17350cfb88fbf6a2e7a9b12ad85f12e174b22b76a
SHA2563a8459f7033c4dec0a2a8ee37090fa2fe38a2013667c969ac870965deb0b8c8d
SHA5120857cc0c6c0aa7204772873a02fbeb11a05d0c890241eedaee6bf4fdd3a4ceaf18e6d612c7e3d47ba1c077104cf91809b133dc2420864d16cd15315c2d47cdf9
-
Filesize
204B
MD5fd933279ea728ff3433922c6a6613e49
SHA1560025fd87011f0d206ed6904adde23e8853a48e
SHA256f320ca23752524c4983228bef08f38f8a64303ae95ec01e346ad4dfdb4d3af9f
SHA5127157fa461b2cde5766ed3f90f06ba208c66f95593c12bfce6a5c72054e609aee6d24bdcfe1efc608a74404eda860748e4b55760f94d1f920bdd8f692b89d1e56