Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe
Resource
win7-20241010-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe
-
Size
315KB
-
MD5
918f83cd6d935bd729990142f8e276e0
-
SHA1
bd15b5a29a83b86d1ab177f16f6d0f3a54dc6741
-
SHA256
8f8830b812c8f50559cddc20140148f16c2c6681b8087da382aab91a1d22e088
-
SHA512
c8e529a268fa1ca589d362538b9b9368a518cdead33cbe383dbb7ffdcced101950911e0cea4ebf0b5343583e48e3b8b490c3167874505a09d53da57cf25f05f1
-
SSDEEP
1536:LTJkxPIwcXpo/s/wyQC7CEJ0nMbYcj/RPc4YjDI4ox0V+s4jDu3Eyufeso1+qUQB:LNqP3UW/s4LQYGhcC1yufwqXYoQN
Malware Config
Extracted
xworm
5.0
185.7.214.211:4444
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x0008000000015d5b-14.dat family_xworm behavioral1/memory/2380-15-0x0000000000200000-0x0000000000210000-memory.dmp family_xworm behavioral1/memory/2628-27-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2628-25-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2628-23-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2628-20-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2628-19-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2812 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 30 PID 2380 wrote to memory of 2812 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 30 PID 2380 wrote to memory of 2812 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 30 PID 2380 wrote to memory of 2812 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 30 PID 2812 wrote to memory of 2276 2812 csc.exe 32 PID 2812 wrote to memory of 2276 2812 csc.exe 32 PID 2812 wrote to memory of 2276 2812 csc.exe 32 PID 2812 wrote to memory of 2276 2812 csc.exe 32 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33 PID 2380 wrote to memory of 2628 2380 SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5196.22979.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4og4bv4t\4og4bv4t.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES537D.tmp" "c:\Users\Admin\AppData\Local\Temp\4og4bv4t\CSC1EEE7CBE5E2F4C1AA156AA84D3A6D3BE.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5db5db9d201742ad2d9aee11ae460d897
SHA14e35f0e54ea2f13b0b1f3c447d76a9ad3700310b
SHA25671363ace078f866d191f74dfa1ab5118837fe3c62cd64465d1667acd51415676
SHA51206301410dab200d5ad04f7b6b336088588cf2e3e0ffe4685b7b5b937acd2e2d05246bd5bb04d29fce5650ac3f4c009952e1e6840d099634516531ca9d70197e0
-
Filesize
1KB
MD5f1d4c84511fdc53de1db69d7ee51b201
SHA180bb1a888f6e6a861dbfc7d3028825580444dace
SHA25672bbc633f054339b3bdda8b29ae391abc76b6c918e01246b734a838815efe3e5
SHA5127130745fe785935f8fb4daac6efa459cf9a4f60a66658621ea67ef8a314e9e854621501552241b06318590d9cf05b4a3e74562107f3f57f92893c49aeed9319e
-
Filesize
101KB
MD5321752ec5d5fef01d4f146035796f9df
SHA1a46dbf6fb95d498fd733d4fde9a3d1b5917ba1f3
SHA2569e9c63652e73aeaf0904794cfe6428f5f72faa493a6d9815dadceb3ef911a393
SHA5125a52ac4a13f4bb6b5813fc3ca446e3366e4902acb7675356a2d675ee612d2bd3affdebc1c446e59a1cc2ab64640b59a09b2e00c25729ccb4c93b1985249b9d73
-
Filesize
204B
MD59bfef409541072064617673ce616a2a8
SHA11d10055240f7b135914e0415991693e47177e064
SHA256c9cbed93e578a7ecf0e764ec8e2b049846ed8a26bbe4d9cce4485d501ede1d79
SHA512b326e2f81d779baa1c7e0c82da9cfef089b8c8e6fe7de43ad656648ed5026483be16e7a993a89c224e874d713c98f9663598ea83b37bbd10f6586a97133e0467
-
Filesize
652B
MD5d0c26bf23276e01a0d10f1f74f0b0b98
SHA12b5b7e88bc9776b6e756c60735a8f113e412b6a8
SHA256b854fed1db14f34b5a43b505b97e1bf86fdc8fe2f0d75273240488bd0b2da1aa
SHA512694c9e710340d8fbda7c9b3f0be2dc32e47884beb9d1fc42646700d5d8a5ec6af3b95a98c30d42f5725aafaa3bfb3c2717ca39189e74f33f9d6d7e278eb881b6